Abstract
The raw data dissemination and publication are very important elements in applications like commercial, academic, medical, etc. Due to the rapid increase in large amount of open technical platforms like social networks, IOT devices, electronics gazettes, and mobile devices, the volume of data has grown over time. The very large data sets that are collected from these platforms have any size and structure. Such characteristics of data add more challenges in extracting results or applying further processing by analyzing and storing. To extract the meaningful knowledge or hidden pattern, big data analytics is used from this massive scale complex data. In both unstructured and structured data, the sensitivity does not be captured by the big data traditional model. Security of big data plays an important role due to the speed of ingesting and processing of data in big data analytics. A small change in data may lead to many complexities to user data. The privacy and security of big data analytics contradict with the extensive use of big data. There is a need of stronger encryption in order to secure user data. Thus, it is a time of need to improve security at several levels for privacy preservation of data. This chapter is concerned with security and privacy in big data. The aim is to encrypt data by developing multiple level of encrypting techniques. The private or personal data may be contained in big data which should not be leaked out. Knowledge mining in big data keeping the privacy measures is a major concern of data. A strong encryption model in form of multilevel is proposed for privacy preservation to the data in big data analytics. For wide applications, cryptography technique plays an important role in providing privacy to sensitive attributes in big data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abadi DJ, Carney D, Cetintemel U, Cherniack M, Convey C, Lee S, Stone-braker M, Tatbul N, Zdonik SB (2003) Aurora: a new model and architecture for data stream manag ement. VLDB J 12(2):120–139
Kolomvatsos K, Anagnostopoulos C, Hadjiefthymiades S (2015) An efficient time optimized scheme for progressive analytics in big data. Big Data Res 2(4):155–165
Tsai C-W, Lai C-F, Chao H-C, Vasilakos AV (2015) Big data analytics: a survey. J Big Data Springer Open J
Chen M, Mao S, Liu Y (2014) Big data: a survey. Mobile Netw Appl 19:171–209. https://doi.org/10.1007/s11036-013-0489-0]
Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S (2016) Protection of big data privacy. In: IEEE translations and content mining are permitted for academic research
Kamila NK, Jena L, Bhuyan HK (2016) Pareto-based multi-objective optimization for classification in data mining. Cluster Comput 19:1723–1745. https://doi.org/10.1007/s10586-016-0643-0
Porambage P et al (2016) The quest for privacy in the internet of things. IEEE Cloud Comput 3(2):36–45
Jing Q et al (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481–2501
Fei H et al (2016) Robust cyber-physical systems: concept, models, and implementation. Future Gener Comp Syst 56:449–475
Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Trans Commun Surv Tutorials 15(2):843–859
Mohammadian E, Noferesti M, Jalili R (2014) FAST: fast anonymization of big data streams. In: Proceedings of the 2014 international conference on big data science and computing, p 23
Evfimievski S (2002) Randomization techniques for privacy preserving association rule mining. In: SIGKDD Explorations 4(2)
Tripathy K, Mitra A (2012) An algorithm to achieve k-anonymity and l-diversity anonymization in social networks. In: Proceedings of fourth international conference on computational aspects of social networks (CA-SoN), Sao Carlos
Jain P, Gyanchandani M, Khare N (2019) Improved k-Anonymity Privacy-Preserving Algorithm Using Madhya Pradesh State Election Commission Big Data, Integrated Intelligent Computing, Communication, and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore, pp 1–10
Kadampur MA (2008) A data perturbation method by field rotation and binning by averages strategy for privacy preservation. In: Fyfe C, Kim D, Lee SY, Yin H (eds) Intelligent data engineering and automated learning—IDEAL, vol 5326., Lecture Notes in Computer ScienceBerlin: Springer
LeFevre K, DeWitt DJ, Ramakrishnan R (2006) Mondrian multidimensional k-anonymity’. In: Proceedings of 22nd International Conference Data Engineering, Ser. ICDE’06. IEEE Computer Society, Washington, DC, USA, April 2006, pp 1–11
Zakerzadeh H, Aggarwal CC, Barker K (2015) Privacy-preserving big data publishing. In: Proceedings 27th International Conference Scientific and Statistical Database Management, Ser. SSDBM ’15. ACM, New York, pp 26:1–26:11
Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Airavat WE (2010) Security and privacy for MapReduce. In: Castro M (eds) Proceedings of the 7th Usenix symposium on networked systems design and implementation. USENIX Association, San Jose
Derbeko P et al (2016) Security and privacy aspects in MapReduce on clouds: a survey. Comput Sci Rev 20:1
Pathak K, Chaudhari NS, Tiwari A (2012) Privacy preserving association rule mining by introducing concept of impact factor. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), Singapore, pp 1458–1461. https://doi.org/10.1109/iciea.2012.6360953
Yadav GS, Ojha A (2018) Multimed Tools Appl 77:16319. https://doi.org/10.1007/s11042-017-5200-1
Terzi R, Terzi, Sagiroglu S (2015) A survey on security and privacy issues in Big Data. In: Proceedings of ICITST 2015, London, UK, December 2015
Kacha L, Zitouni A (2017) An overview on data security in cloud computing. In: CoMeSySo: cybernetics approaches in intelligent systems. Springer, pp 250–261
Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. In: Machine learning and data mining in aerospace technology. Springer, Cham, pp 189–204
Mishra S, Mallick PK, Jena L, Chae GS (2020) Optimization of Skewed data using sampling-based preprocessing approach. Front Public Health 8:274. https://doi.org/10.3389/fpubh.2020.00274
Ilavarasi K, Sathiyabhama B (2017) An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. J Cluster Comput (Springer, New York)
Jena L, Kamila NK, Mishra S (2014) Privacy preserving distributed data mining with evolutionary computing. In: Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-319-02931-3_29
Mishra S, Tripathy N, Mishra BK, Mahanty C (2019) Analysis of security issues in cloud environment. In: Security Designs for the Cloud, Iot, and Social Networking, pp 19–41
Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557–570
Mishra S, Mahanty C, Dash S, Mishra BK (2019) Implementation of BFS-NB hybrid model in intrusion detection system. In: Recent developments in machine learning and data analytics. Springer, Singapore, pp 167–175
Mishra S, Tripathy HK, Mallick PK, Bhoi AK, Barsocchi P (2020) EAGA-MLP—an enhanced and adaptive hybrid classification model for diabetes diagnosis. Sensors 20(14):4036
Bredereck R, Nichterlein A, Niedermeier R, Philip G (2011) The effect of homogeneity on the complexity of k-anonymity. In: FCT, pp 53–64
Jain P, Gyanchandani M, Khare N (2019) Enhanced secured map reduce layer for Big Data privacy and security. J Big Data 6:30. https://doi.org/10.1186/s40537-019-0193-4
Mishra S, Mishra BK, Tripathy HK, Dutta A (2020) Analysis of the role and scope of big data analytics with IoT in health care domain. In: Handbook of data science approaches for biomedical engineering. Academic Press, pp 1–23
Mishra S, Tripathy HK, Mishra BK, Sahoo S (2018) Usage and analysis of Big Data in E-health domain. In: Big Data management and the Internet of Things for improved health systems. IGI Global, pp 230–242
Mishra S, Tripathy HK, Mishra BK (2018) Implementation of biologically motivated optimisation approach for tumour categorisation. Int J Comput Aided Eng Technol 10(3):244–256
Shen Z, Li Li, Yan F, Xiaoping Wu (2010) Cloud computing system based on trusted computing platform. Int Conf Intelligent Comput Technol Autom 1:942–945
Mishra S, Sahoo S, Mishra BK (2019) Addressing security issues and standards in Internet of things. In: Emerging trends and applications in cognitive computing. IGI Global, pp 224–257
Kaur M, Mahajan M (2012) Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. VSRD Int J Comput Sci Information Technol 2:831–835
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Jena, L., Mohanty, R., Mohanty, M.N. (2021). Privacy-Preserving Cryptographic Model for Big Data Analytics. In: Das, P.K., Tripathy, H.K., Mohd Yusof, S.A. (eds) Privacy and Security Issues in Big Data. Services and Business Process Reengineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-1007-3_7
Download citation
DOI: https://doi.org/10.1007/978-981-16-1007-3_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1006-6
Online ISBN: 978-981-16-1007-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)