New Data Publishing Framework in the Big Data Environments

The traditional data publishing methods will remove the sensitive attributes and generate the abundant records to achieve the goal of privacy protection. In the big data environment, they cannot satisfy some data mining tasks with privacy considerations. This paper provides a new data publishing framework. It can preserve the data integrity, i.e., the original data structure is preserved, and it doesn't require deleting any attribute and adding k-times data to achieve anonymity.

[1]  Jingwei Li,et al.  Format-preserving encryption for DateTime , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[2]  Terence Spies Format Preserving Encryption , 2008 .

[3]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[4]  M. Bellare,et al.  The FFX Mode of Operation for Format-Preserving Encryption Draft 1 . 1 , 2010 .

[5]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[6]  Fatos Xhafa,et al.  L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..

[7]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  YangJun,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016 .

[9]  Ashwin Machanavajjhala,et al.  Worst-Case Background Knowledge for Privacy-Preserving Data Publishing , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[10]  Phillip Rogaway,et al.  How to Encipher Messages on a Small Domain , 2009, CRYPTO.

[11]  Jin Li,et al.  TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage , 2014, ACISP.

[12]  Yufei Tao,et al.  Anatomy: simple and effective privacy preservation , 2006, VLDB.

[13]  Ilsun You,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..

[14]  John Black,et al.  Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.

[15]  Qing Zhang,et al.  Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.