Skip to main content

Privacy-Preserving Cryptographic Model for Big Data Analytics

  • Chapter
  • First Online:
Privacy and Security Issues in Big Data

Abstract

The raw data dissemination and publication are very important elements in applications like commercial, academic, medical, etc. Due to the rapid increase in large amount of open technical platforms like social networks, IOT devices, electronics gazettes, and mobile devices, the volume of data has grown over time. The very large data sets that are collected from these platforms have any size and structure. Such characteristics of data add more challenges in extracting results or applying further processing by analyzing and storing. To extract the meaningful knowledge or hidden pattern, big data analytics is used from this massive scale complex data. In both unstructured and structured data, the sensitivity does not be captured by the big data traditional model. Security of big data plays an important role due to the speed of ingesting and processing of data in big data analytics. A small change in data may lead to many complexities to user data. The privacy and security of big data analytics contradict with the extensive use of big data. There is a need of stronger encryption in order to secure user data. Thus, it is a time of need to improve security at several levels for privacy preservation of data. This chapter is concerned with security and privacy in big data. The aim is to encrypt data by developing multiple level of encrypting techniques. The private or personal data may be contained in big data which should not be leaked out. Knowledge mining in big data keeping the privacy measures is a major concern of data. A strong encryption model in form of multilevel is proposed for privacy preservation to the data in big data analytics. For wide applications, cryptography technique plays an important role in providing privacy to sensitive attributes in big data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abadi DJ, Carney D, Cetintemel U, Cherniack M, Convey C, Lee S, Stone-braker M, Tatbul N, Zdonik SB (2003) Aurora: a new model and architecture for data stream manag ement. VLDB J 12(2):120–139

    Article  Google Scholar 

  2. Kolomvatsos K, Anagnostopoulos C, Hadjiefthymiades S (2015) An efficient time optimized scheme for progressive analytics in big data. Big Data Res 2(4):155–165

    Article  Google Scholar 

  3. Tsai C-W, Lai C-F, Chao H-C, Vasilakos AV (2015) Big data analytics: a survey. J Big Data Springer Open J

    Google Scholar 

  4. Chen M, Mao S, Liu Y (2014) Big data: a survey. Mobile Netw Appl 19:171–209. https://doi.org/10.1007/s11036-013-0489-0]

  5. Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S (2016) Protection of big data privacy. In: IEEE translations and content mining are permitted for academic research

    Google Scholar 

  6. Kamila NK, Jena L, Bhuyan HK (2016) Pareto-based multi-objective optimization for classification in data mining. Cluster Comput 19:1723–1745. https://doi.org/10.1007/s10586-016-0643-0

    Article  Google Scholar 

  7. Porambage P et al (2016) The quest for privacy in the internet of things. IEEE Cloud Comput 3(2):36–45

    Article  Google Scholar 

  8. Jing Q et al (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481–2501

    Article  Google Scholar 

  9. Fei H et al (2016) Robust cyber-physical systems: concept, models, and implementation. Future Gener Comp Syst 56:449–475

    Article  Google Scholar 

  10. Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Trans Commun Surv Tutorials 15(2):843–859

    Article  Google Scholar 

  11. Mohammadian E, Noferesti M, Jalili R (2014) FAST: fast anonymization of big data streams. In: Proceedings of the 2014 international conference on big data science and computing, p 23

    Google Scholar 

  12. Evfimievski S (2002) Randomization techniques for privacy preserving association rule mining. In: SIGKDD Explorations 4(2)

    Google Scholar 

  13. Tripathy K, Mitra A (2012) An algorithm to achieve k-anonymity and l-diversity anonymization in social networks. In: Proceedings of fourth international conference on computational aspects of social networks (CA-SoN), Sao Carlos

    Google Scholar 

  14. Jain P, Gyanchandani M, Khare N (2019) Improved k-Anonymity Privacy-Preserving Algorithm Using Madhya Pradesh State Election Commission Big Data, Integrated Intelligent Computing, Communication, and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore, pp 1–10

    Google Scholar 

  15. Kadampur MA (2008) A data perturbation method by field rotation and binning by averages strategy for privacy preservation. In: Fyfe C, Kim D, Lee SY, Yin H (eds) Intelligent data engineering and automated learning—IDEAL, vol 5326., Lecture Notes in Computer ScienceBerlin: Springer

    Google Scholar 

  16. LeFevre K, DeWitt DJ, Ramakrishnan R (2006) Mondrian multidimensional k-anonymity’. In: Proceedings of 22nd International Conference Data Engineering, Ser. ICDE’06. IEEE Computer Society, Washington, DC, USA, April 2006, pp 1–11

    Google Scholar 

  17. Zakerzadeh H, Aggarwal CC, Barker K (2015) Privacy-preserving big data publishing. In: Proceedings 27th International Conference Scientific and Statistical Database Management, Ser. SSDBM ’15. ACM, New York, pp 26:1–26:11

    Google Scholar 

  18. Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Airavat WE (2010) Security and privacy for MapReduce. In: Castro M (eds) Proceedings of the 7th Usenix symposium on networked systems design and implementation. USENIX Association, San Jose

    Google Scholar 

  19. Derbeko P et al (2016) Security and privacy aspects in MapReduce on clouds: a survey. Comput Sci Rev 20:1

    Article  MathSciNet  Google Scholar 

  20. Pathak K, Chaudhari NS, Tiwari A (2012) Privacy preserving association rule mining by introducing concept of impact factor. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), Singapore, pp 1458–1461. https://doi.org/10.1109/iciea.2012.6360953

  21. Yadav GS, Ojha A (2018) Multimed Tools Appl 77:16319. https://doi.org/10.1007/s11042-017-5200-1

    Article  Google Scholar 

  22. Terzi R, Terzi, Sagiroglu S (2015) A survey on security and privacy issues in Big Data. In: Proceedings of ICITST 2015, London, UK, December 2015

    Google Scholar 

  23. Kacha L, Zitouni A (2017) An overview on data security in cloud computing. In: CoMeSySo: cybernetics approaches in intelligent systems. Springer, pp 250–261

    Google Scholar 

  24. Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. In: Machine learning and data mining in aerospace technology. Springer, Cham, pp 189–204

    Google Scholar 

  25. Mishra S, Mallick PK, Jena L, Chae GS (2020) Optimization of Skewed data using sampling-based preprocessing approach. Front Public Health 8:274. https://doi.org/10.3389/fpubh.2020.00274

    Article  Google Scholar 

  26. Ilavarasi K, Sathiyabhama B (2017) An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. J Cluster Comput (Springer, New York)

    Google Scholar 

  27. Jena L, Kamila NK, Mishra S (2014) Privacy preserving distributed data mining with evolutionary computing. In: Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-319-02931-3_29

  28. Mishra S, Tripathy N, Mishra BK, Mahanty C (2019) Analysis of security issues in cloud environment. In: Security Designs for the Cloud, Iot, and Social Networking, pp 19–41

    Google Scholar 

  29. Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557–570

    Article  MathSciNet  Google Scholar 

  30. Mishra S, Mahanty C, Dash S, Mishra BK (2019) Implementation of BFS-NB hybrid model in intrusion detection system. In: Recent developments in machine learning and data analytics. Springer, Singapore, pp 167–175

    Google Scholar 

  31. Mishra S, Tripathy HK, Mallick PK, Bhoi AK, Barsocchi P (2020) EAGA-MLP—an enhanced and adaptive hybrid classification model for diabetes diagnosis. Sensors 20(14):4036

    Article  Google Scholar 

  32. Bredereck R, Nichterlein A, Niedermeier R, Philip G (2011) The effect of homogeneity on the complexity of k-anonymity. In: FCT, pp 53–64

    Google Scholar 

  33. Jain P, Gyanchandani M, Khare N (2019) Enhanced secured map reduce layer for Big Data privacy and security. J Big Data 6:30. https://doi.org/10.1186/s40537-019-0193-4

    Article  Google Scholar 

  34. Mishra S, Mishra BK, Tripathy HK, Dutta A (2020) Analysis of the role and scope of big data analytics with IoT in health care domain. In: Handbook of data science approaches for biomedical engineering. Academic Press, pp 1–23

    Google Scholar 

  35. Mishra S, Tripathy HK, Mishra BK, Sahoo S (2018) Usage and analysis of Big Data in E-health domain. In: Big Data management and the Internet of Things for improved health systems. IGI Global, pp 230–242

    Google Scholar 

  36. Mishra S, Tripathy HK, Mishra BK (2018) Implementation of biologically motivated optimisation approach for tumour categorisation. Int J Comput Aided Eng Technol 10(3):244–256

    Article  Google Scholar 

  37. Shen Z, Li Li, Yan F, Xiaoping Wu (2010) Cloud computing system based on trusted computing platform. Int Conf Intelligent Comput Technol Autom 1:942–945

    Google Scholar 

  38. Mishra S, Sahoo S, Mishra BK (2019) Addressing security issues and standards in Internet of things. In: Emerging trends and applications in cognitive computing. IGI Global, pp 224–257

    Google Scholar 

  39. Kaur M, Mahajan M (2012) Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. VSRD Int J Comput Sci Information Technol 2:831–835

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jena, L., Mohanty, R., Mohanty, M.N. (2021). Privacy-Preserving Cryptographic Model for Big Data Analytics. In: Das, P.K., Tripathy, H.K., Mohd Yusof, S.A. (eds) Privacy and Security Issues in Big Data. Services and Business Process Reengineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-1007-3_7

Download citation

Publish with us

Policies and ethics