...
首页> 外文期刊>Journal of computer sciences >A Survey of Data Anonymization Techniques for Privacy-Preserving Mining in Bigdata
【24h】

A Survey of Data Anonymization Techniques for Privacy-Preserving Mining in Bigdata

机译:大数据中保留隐私挖掘的数据匿名技术调查

获取原文
           

摘要

Bigdata era is seeing the data burst occurring in a multitude of angles that are better expressed in terms of the 4Vs (Volume, Velocity, Velocity, Veracity). While trying to infer information from data, care should be exercised as not to reveal the identity of the data owner, which breaches the privacy rights. Leakage of information can happen right from the data collection point, at the data storage area, followed by the distribution of data to data users/miners and finally with published results. A cross-matching of all these points with the 4Vs (growing still) of big data, puts a huge challenge on how to extract the maximum possible information, without compromising on the privacy of the data owner. Anonymization of the original data should be done at one or more of the above-mentioned stages before the data are given for the mining process. This work makes a survey of the various anonymization techniques followed to transform the data in such a way that the privacy of the data owner is not compromised. Also, the sample data drawn should resemble and represent the original dataset in the maximum possible number of dimensions. The results of the various methodologies have been analyzed and the observations have been presented.
机译:BigData Era正在看到以4Vs(体积,速度,速度,准确性)更好地表达的多个角度的数据突发。在尝试从数据中推断信息的同时,应注意不要揭示数据所有者的身份,这违反了隐私权。信息泄漏可能会在数据收集点处发生,在数据存储区域,然后是数据用户/矿工分发数据,最后使用已发布的结果。所有这些点的交叉匹配与大数据的4Vs(仍然增长),对如何提取最大可能信息的巨大挑战,而不会影响数据所有者的隐私。在给出挖掘过程之前,应在上述一个或多个上述阶段进行原始数据的匿名化。这项工作对各种匿名化技术进行了调查,然后以这样的方式转换数据,使得数据所有者的隐私不会受到损害。此外,绘制的示例数据应该类似于最大可能数量的尺寸。已经分析了各种方法的结果,并提出了观察结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号