scispace - formally typeset
Open AccessJournal ArticleDOI

Big Data Privacy: Challenges to Privacy Principles and Models

Jordi Soria-Comas, +1 more
- 01 Mar 2016 - 
- Vol. 1, Iss: 1, pp 21-28
TLDR
How well the two main privacy models used in anonymization meet the requirements of big data, namely composability, low computational cost and linkability is evaluated.
Abstract
This paper explores the challenges raised by big data in privacy-preserving data management. First, we examine the conflicts raised by big data with respect to preexisting concepts of private data management, such as consent, purpose limitation, transparency and individual rights of access, rectification and erasure. Anonymization appears as the best tool to mitigate such conflicts, and it is best implemented by adhering to a privacy model with precise privacy guarantees. For this reason, we evaluate how well the two main privacy models used in anonymization (k-anonymity and \(\varepsilon \)-differential privacy) meet the requirements of big data, namely composability, low computational cost and linkability.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

TL;DR: This survey covers technologies that allow privacy-aware outsourcing of storage and processing of sensitive data to public clouds and reviews masking methods for outsourced data based on data splitting and anonymization, in addition to cryptographic methods covered in other surveys.
Journal ArticleDOI

An Ethics Framework for Big Data in Health and Research

TL;DR: An Ethics Framework for Big Data in Health and Research developed by a working group convened by the Science, Health and Policy-relevant Ethics in Singapore (SHAPES) Initiative is presented, supported by the underlying ethical concerns that relate to all health and research contexts.
Posted ContentDOI

Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.

TL;DR: An analysis of the proposed privacy by design strategies in the different phases of the big data value chain, and a review of privacy enhancing technologies of special interest for the current and future big data landscape.
Book

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

TL;DR: This Synthesis Lecture provides a comprehensive overview of the fundamentals of privacy in data releases focusing on the computer science perspective and identifies and discusses in detail connections between several privacy models and links between anonymization methods and privacy models.
Proceedings ArticleDOI

An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem

TL;DR: A fine-grained attribute-based access control model, referred as HeABAC, catering to the security and privacy needs of multi-tenant Hadoop ecosystem is presented, including the novel concept of cross Hadoops services trust.
References
More filters
Journal ArticleDOI

MapReduce: simplified data processing on large clusters

TL;DR: This paper presents the implementation of MapReduce, a programming model and an associated implementation for processing and generating large data sets that runs on a large cluster of commodity machines and is highly scalable.
Journal ArticleDOI

MapReduce: simplified data processing on large clusters

TL;DR: This presentation explains how the underlying runtime system automatically parallelizes the computation across large-scale clusters of machines, handles machine failures, and schedules inter-machine communication to make efficient use of the network and disks.
Book ChapterDOI

Calibrating noise to sensitivity in private data analysis

TL;DR: In this article, the authors show that for several particular applications substantially less noise is needed than was previously understood to be the case, and also show the separation results showing the increased value of interactive sanitization mechanisms over non-interactive.
Book ChapterDOI

Differential privacy

TL;DR: In this article, the authors give a general impossibility result showing that a formalization of Dalenius' goal along the lines of semantic security cannot be achieved, and suggest a new measure, differential privacy, which, intuitively, captures the increased risk to one's privacy incurred by participating in a database.
Journal ArticleDOI

L-diversity: Privacy beyond k-anonymity

TL;DR: This paper shows with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems, and proposes a novel and powerful privacy definition called \ell-diversity, which is practical and can be implemented efficiently.