THE RESEARCH OF BIG DATA ANALYTICS OF PRIVACY PRESERVATION IN UBIQUITOUS ENVIRONMENT
Abstract
Big data analytics has created opportunities for researchers to process huge amount of data but created a big threat to privacy of individual. Data processed by big data analytics platforms may have personal information, which needs to be taken care of when deriving some useful results for research. Existing privacy preserving techniques like, anonymization requires having dataset divided in the set of attributes like, sensitive attributes, quasi identifiers, and non - sensitive attributes. With the organized data, it may possible to have such a distribution but in unstructured data, it is very difficult to identify sensitive attributes and quasi identifiers. The development of the Data Science, Sets off the third waves of the world information industry. The data mining technology plays a vital role in the development and promotion of Data Science and ubiquitous environment, but it causes leakage problem of privacy information at the same time. In the light of the data mining association rules and randomized response method. We propose a new method, suppressible randomized response method (SRRM), and introduce the data mining algorithm of privacy protection based on SRR. Finally, this paper evaluates the privacy of the method.
References
Langheinrich, M. 2002. A privacy awareness system for Ubiquitous computing Environments. In: Borriello, G., and Holmquist, L.E. (eds). UbiComp 2002. LCNS, vol. 2498, p. 237-245. Springer, Heildelberf (2002).
Warner, S. L. 1965. Randomized response: A Survey technique for eliminating evasive answer bias. Journal of the American Statistical Association. 60, 63-69.
Dong, A. 2007. Privacy-preserving Associatio Rules Mining. DaLian: Dalian Jiaotong University.
Agrawal, R., and Srikant, R. 2000. Privacy preserving data mining. In: Weidong, C., and Jeffrey F. (eds) Proc of the ACM SIGMOD Conf. on Management of Data, p. 439 - 450. Dallas: ACM Press.
"Big data definition" [online] Available: http://en.wikipedia.org/wiki/Big data
P. J. Sadalage, and M. Flower. 2012. NoSQL Distilled: A Brief guide to the Emerging world of Polyglot Persistence, 1st ed. Addison-Wesley Professional.
L. Garber. 2013. Security privacy, policy, and dependability roundup. IEEE Security and Privacy, vol. 11, No. 2, p. 6-7, March. "Ehr" [Online] Available: http://www.himss.org/library/ ehr/
J. Sedayao, R. Bharadwaj, and N. Gorade. (June, 2014). "Making big data, privacy, and anonymization work together in the enterprise: Experiences and issues" In 2014 IEEE International Congress on Big Data. p. 601-607.
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. (June 2010). "Privacy preserving data publishing: A survey of recent developments". ACM computing surveys, Vol. 42, No. 4, p. 14:1-14:53.