Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, and many research efforts have been directed to big data processing due to its high volume, velocity, and variety (referred to as "3V") challenges. However, in addition to the 3V challenges, the flourishing of big data also hinges on fully understanding and managing newly arising security and privacy challenges. If data are not authentic, new mined knowledge will be unconvincing; while if privacy is not well addressed, people may be reluctant to share their data. Because security has been investigated as a new dimension, "veracity," in big data, in this article, we aim to exploit new challenges of big data in terms of privacy, and devote our attention toward efficient and privacy-preserving computing in the big data era. Specifically, we first formalize the general architecture of big data analytics, identify the corresponding privacy requirements, and introduce an efficient and privacy-preserving cosine similarity computing protocol as an example in response to data mining's efficiency and privacy requirements in the big data era.
[1]
Xiaohui Liang,et al.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
,
2012,
IEEE Transactions on Parallel and Distributed Systems.
[2]
Mani Krishna,et al.
SPOC : A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
,
2012
.
[3]
Pascal Paillier,et al.
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
,
1999,
EUROCRYPT.
[4]
Simon Liu.
Exploring the Future of Computing
,
2013
.
[5]
Ming Li,et al.
Toward privacy-assured and searchable cloud data storage services
,
2013,
IEEE Network.