Information Security in Big Data: Privacy and Data Mining

被引:339
|
作者
Xu, Lei [1 ]
Jiang, Chunxiao [1 ]
Wang, Jian [1 ]
Yuan, Jian [1 ]
Ren, Yong [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
来源
IEEE ACCESS | 2014年 / 2卷
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Data mining; sensitive information; privacy-preserving data mining; anonymization; provenance; game theory; privacy auction; anti-tracking; TRAJECTORY DATA; ANONYMIZATION; ANONYMITY;
D O I
10.1109/ACCESS.2014.2362522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing popularity and development of data mining technologies bring serious threat to the security of individual's sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.
引用
收藏
页码:1149 / 1176
页数:28
相关论文
共 50 条
  • [21] Ethics of Big Data: Privacy, Security and Trust
    Yarali, Abdulrahman
    Joyce, Randall
    Dixon, Brandon
    [J]. 2020 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2020,
  • [22] Preface: Security & privacy in social big data
    Liu, Qin
    Bhuiyan, Md Zakirul Alam
    Hu, Jiankun
    Wu, Jie
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 141 : 59 - 60
  • [23] Big Data Platform Privacy and Security, A Review
    Shahin, Dana
    Ennab, Hannen
    Saeed, Reham
    Alwidian, Jaber
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (05): : 24 - 35
  • [24] Big data management: Security and privacy concerns
    Atoum, Ibrahim A.
    Keshta, Ismail M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2021, 8 (05): : 73 - 83
  • [25] A Survey of Big Data Security and Privacy Preserving
    Fang, Wei
    Wen, Xue Zhi
    Zheng, Yu
    Zhou, Ming
    [J]. IETE TECHNICAL REVIEW, 2017, 34 (05) : 544 - 560
  • [26] Big healthcare data: preserving security and privacy
    Abouelmehdi, Karim
    Beni-Hessane, Abderrahim
    Khaloufi, Hayat
    [J]. JOURNAL OF BIG DATA, 2018, 5 (01)
  • [27] Big Data Analytics: Security and Privacy Challenges
    Gahi, Youssef
    Guennoun, Mouhcine
    Mouftah, Hussein T.
    [J]. 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 952 - 957
  • [28] Security and Privacy Issues in Big Data: A Review
    Jadon, Priyanshu
    Mishra, Durgesh Kumar
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 659 - 665
  • [29] A Survey on Security and Privacy Issues in Big Data
    Terzi, Duygu Sinanc
    Terzi, Ramazan
    Sagiroglu, Seref
    [J]. 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 202 - 207
  • [30] Security and Privacy in Big Data Lifetime: A Review
    Chen, Hanlu
    Yan, Zheng
    [J]. SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 3 - 15