Toward Efficient and Privacy-Preserving Computing in Big Data Era

被引:210
|
作者
Lu, Rongxing [1 ]
Zhu, Hui [2 ]
Liu, Ximeng [1 ,2 ]
Liu, Joseph K. [3 ]
Shao, Jun [4 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[2] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[3] Inst Infocomm Res I2R, Singapore, Singapore
[4] Zhejiang Gongshang Univ, Hangzhou, Zhejiang, Peoples R China
来源
IEEE NETWORK | 2014年 / 28卷 / 04期
关键词
10;
D O I
10.1109/MNET.2014.6863131
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, and many research efforts have been directed to big data processing due to its high volume, velocity, and variety (referred to as "3V") challenges. However, in addition to the 3V challenges, the flourishing of big data also hinges on fully understanding and managing newly arising security and privacy challenges. If data are not authentic, new mined knowledge will be unconvincing; while if privacy is not well addressed, people may be reluctant to share their data. Because security has been investigated as a new dimension, "veracity," in big data, in this article, we aim to exploit new challenges of big data in terms of privacy, and devote our attention toward efficient and privacy-preserving computing in the big data era. Specifically, we first formalize the general architecture of big data analytics, identify the corresponding privacy requirements, and introduce an efficient and privacy-preserving cosine similarity computing protocol as an example in response to data mining's efficiency and privacy requirements in the big data era.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [1] Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
    Mehta, Brijesh B.
    Rao, Udai Pratap
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 297 - 304
  • [2] An Efficient and Privacy-preserving Similarity Evaluation For Big Data Analytics
    Gheid, Zakaria
    Challal, Yacine
    [J]. 2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 281 - 289
  • [3] SoK: Privacy-Preserving Computing in the Blockchain Era
    Almashaqbeh, Ghada
    Solomon, Ravital
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 124 - 139
  • [4] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136
  • [5] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [6] Research Progress on Privacy-Preserving Techniques in Big Data Computing Environment
    Qian, Wen-Jun
    Shen, Qing-Ni
    Wu, Peng-Fei
    Dong, Chun-Tao
    Wu, Zhong-Hai
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (04): : 669 - 701
  • [7] Privacy-Preserving Big Data Publishing
    Zakerzadeh, Hessam
    Aggarwal, Charu C.
    Barker, Ken
    [J]. PROCEEDINGS OF THE 27TH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, 2015,
  • [8] Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era
    Sherif, Ahmed B. T.
    Rabieh, Khaled
    Mahmoud, Mohamed M. E. A.
    Liang, Xiaohui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 611 - 618
  • [9] Privacy-Preserving Access to Big Data in the Cloud
    Li, Peng
    Guo, Song
    Miyazaki, Toshiaki
    Xie, Miao
    Hu, Jiankun
    Zhuang, Weihua
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (05): : 34 - 42
  • [10] Privacy-preserving representation learning for big data
    Zhu, Xiaofeng
    Shang, Shuo
    Kim, Minjeong
    [J]. NEUROCOMPUTING, 2020, 406 (406) : 293 - 294