Abstract
In the present age, diversified data—both structured and unstructured, is being produced in huge amounts from sources like database transactions, audios, images, videos, social online platforms, etc., and that too within a time period of a millionth of a second. While this data is consumed and stored in large volumes, it is quite complex in nature and is growing within the constraints of self-regulatory sources. As a result, conventional procedures of data analysis and management fail in successfully managing the large data sets, collectively called as big data. Henceforth, by using a variety of techniques in the domain of data mining on large data sets, useful information is obtained, but this process is as meticulous as it is challenging. One of the biggest challenges, among others, is maintaining data privacy and to restrict unauthorized access to sensitive data generated, exchanged or recorded in banking transactions, health sector procedures, user interactions on social media as online presence and dependency of users has exponentially increased along with proliferation of sensitive information. This paper presents research insights into challenges in big data mining and the privacy concerns in big data besides presenting gaps in the research that can be used to plan future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
U. Ahsan, A.A. Bais, Review on big data analysis and Internet of things, in 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (IEEE, 2016), pp. 325–330. https://doi.org/10.1109/mass.2016.38
N. Chakraborty, S. Gonnade, Big data and big data mining: study of approaches, issues and future scope. Int. J. Eng. Trends Technol. 18, 221–223 (2014)
I. Kalbandi, J.A. Anuradha, Brief introduction on big data 5Vs characteristics and Hadoop technology, in Procedia Computer Science 48: International Conference on Computer, Communication and Convergence (ICCC 2015), vol. 48 (2015), pp. 319–324
P.G. Sawant, B.L. Desai, Big data mining: challenges and opportunities to forecast future scenario. Int. J. Innov. Technol. Explor. Eng. 3, 5228–5232 (2015)
S. Madan, K. Bhardwaj, S. Gupta, A literature analysis on big data paving its way to E-business, in Emerging Trends in Information Technology (2019). ISBN 978-93-89165-99-9
I.A.T. Hashem et al., The rise of ‘big data’ on cloud computing: review and open research issues. Inf. Syst. 47, 98–115 (2015)
S. Sagiroglu, D. Sinanc, Big data: a review, in 2013 International Conference on Collaboration Technologies and Systems (CTS) (IEEE, 2013), pp. 42–47
H. Dev, T. Sen, M. Basak, M.E. Ali, An approach to protect the privacy of cloud data from data mining based attacks, in 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (IEEE, 2013), pp. 1106–1115. https://doi.org/10.1109/sc.companion.2012.133
D.K. Singh, V. Swaroop, Data security and privacy in data mining: research issues & preparation. Int. J. Comput. Trends Technol. 4, 194–200 (2013)
A. Sameer, Big data and data mining a study of (characteristics, factory work, security threats and solution for big data, data mining architecture, challenges & solutions with big data), in Advancing Web Paging Techniques (2016), pp. I–XXVI. https://doi.org/10.13140/rg.2.1.3238.9525
M.R. Choopa, Data mining and security in big data. Int. J. Adv. Res. Comput. Eng. Technol. 4, 1065–1069 (2015)
S.M. Nargundi, R. Phalnikar, Data DE-identification tool for privacy preserving data mining. Int. J. Comput. Sci. Eng. Inf. Technol. Res. 3, 267–276 (2013)
L. Hbibi, H. Barka, Big data: framework and issues, in 2016 International Conference on Electrical and Information Technologies (ICEIT) (IEEE, 2016), p. 6
S. Srijayanthi, R. Sethukkarasi, A comprehensive survey on privacy preserving big data mining. Int. J. Comput. Appl. Technol. Res. 6, 79–86 (2017)
M. Kaushik, A. Jain, Challenges to big data security and privacy. Int. J. Comput. Sci. Inf. Technol. 5, 3042–3043 (2014)
M. Smith, C. Szongott, B. Henne, G. Von Voigt, Big data privacy issues in public social media, in 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) (IEEE, 2013), p. 6
G. Geethakumari, A. Srivatsava, Big data analysis for implementation of enterprise data security. Int. J. Comput. Sci. Inf. Technol. Secur. 2, 742–746 (2012)
K.U. Jaseena, J.M. David, Issues, challenges, and solutions: big data mining, in Sixth International Conference on Networks & Communications (2014), pp. 131–140
S. Kim, I. Lee, Data block management scheme based on secret sharing for HDFS, in 10th International Conference on Broadband and Wireless Computing, Communication and Applications Data (IEEE, 2015), pp. 51–56. https://doi.org/10.1109/bwcca.2015.70
S. Kaisler, F. Armour, J.A. Espinosa, W. Money, Big data: issues and challenges moving forward, in 2013 46th Hawaii International Conference on System Sciences (IEEE, 2013), pp. 995–1004. https://doi.org/10.1109/hicss.2013.645
L. Xu, C. Jiang, J. Wang, J. Yuan, Y. Ren, Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2014)
A. Katal, M. Wazid, R.H. Goudar, Big data: issues, challenges, tools and good practices, in 2013 Sixth International Conference on Contemporary Computing (IC3) (IEEE, 2013), pp. 404–409
N.I. Hussain, B. Choudhury, S. Rakshit, A novel method for preserving privacy in big-data mining. Int. J. Comput. Appl. 103, 21–25 (2014)
S. Vennila, J. Priyadarshini, Scalable privacy preservation in big data a survey, in 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15), ed. by V. Vijayakumar, V. Neelanarayanan. Procedia Comput. Sci. 50, 369–373 (Elsevier B.V) (2015)
X. Wu, X. Zhu, S. Member, Data mining with big data. IEEE Trans. Knowl. Data Eng. 26, 97–107 (2014)
S. Salini, S.V. Kumar, R. Neevan, Survey on data privacy in big data with K-anonymity. Int. J. Innov. Res. Comput. Commun. 3, 3765–3771 (2015)
S. Madan, P. Goswami, A novel technique for privacy preservation using K-anonymization and nature inspired optimization algorithms, in International Conference on Sustainable Computing in Science, Technology & Management (2019)
M. Balusamy, Data anonymization through generalization using map reduce on cloud, in 2014 IEEE International Conference on Computer Communication and Systems (ICCCS ‘14) (IEEE, 2014), pp. 39–42
A. Gosain, N. Chugh, Privacy preservation in big data. Int. J. Comput. Appl. 100, 44–47 (2014)
M. Sangeetha, P. Anishprabu, S. Shanmathi, Homomorphic encryption schema for privacy preserving mining of association rules. Int. J. Innov. Res. Sci. Eng.
B.C.M. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in ICDE ‘05 Proceedings of the 21st International Conference on Data Engineering (IEEE, 2005), pp. 205–2016
I. Sridhar, P. Jacob, Secure two party high dimensional private data using data mash up. Int. J. Comput. Sci. Inf. Technol. 5, 644–645 (2014)
K. Liang, W. Susilo, J.K. Liu, Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10, 1–11 (2015)
P.C. Kaur, T. Ghorpade, V. Mane, Analysis of data security by using anonymization techniques, in 2016 6th International Conference—Cloud System and Big Data Engineering (Confluence) (IEEE, 2016), pp. 287–293
K. Rodiya, P. Gill, A review on anonymization techniques for privacy preserving data publishing. Int. J. Eng. Res. Technol. 4, 228–231 (2015)
S. Lohiya, L. Ragha, Privacy preserving in data mining using hybrid approach, in 2012 Fourth International Conference on Computational Intelligence and Communication Networks (IEEE, 2012), pp. 743–746. https://doi.org/10.1109/cicn.2012.166
S. Madan, P. Goswami, K-DDD measure and MapReduce based anonymity model for secured privacy preserving big data publishing. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 27(2), 177–199 (2019)
S. Madan, P. Goswami, Nature inspired computational intelligence implementation for privacy preservation in MapReduce framework. IJIIDS 13(2/3/4), 191–207 (2020). https://doi.org/10.1504/IJIIDS.2020.109455
S. Madan, P. Goswami, A privacy preservation model for big data in map-reduced framework based on k-anonymization and swarm-based algorithms. IJIEI 8(1), 38–53 (2020). https://doi.org/10.1504/IJIEI.2020.105433
M. Du, K. Wang, Y. Chen, X. Wang, Y. Sun, Big data privacy preserving in multi-access edge computing for heterogeneous Internet of things. IEEE Commun. Mag. 56, 62–67 (2018)
A. Al-Shomrani, F. Eassa, K. Jambi, Big data security and privacy challenges. Int. J. Eng. Dev. Res (IJEDR) 6(1), 894–900 (2018). ISSN: 2321-9939. http://www.ijedr.org/papers/IJEDR1801155.pdf
D. Gottesman, I.L. Chuang, Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature 402(6760), 390–393 (1999)
S. Barz, E. Kashefi, A. Broadbent, J.F. Fitzsimons, A. Zeilinger, P. Walther, Demonstration of blind quantum computing. Science 335(6066), 303–308 (2012)
B.C.M. Fung, K. Wang, R. Chen, P.S. Yu, Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010). Art. No. 14
Advances in Computational Psychophysiology. Accessed on 17 May 2016. [Online]. http://www.sciencemag.org/custompublishing/collections/advances-computational-psychophysiology
S. Yu, Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016). https://doi.org/10.1109/ACCESS.2016.2577036
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Madan, S., Bhardwaj, K., Gupta, S. (2022). Critical Analysis of Big Data Privacy Preservation Techniques and Challenges. In: Khanna, A., Gupta, D., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1394. Springer, Singapore. https://doi.org/10.1007/978-981-16-3071-2_23
Download citation
DOI: https://doi.org/10.1007/978-981-16-3071-2_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3070-5
Online ISBN: 978-981-16-3071-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)