Skip to main content

Critical Analysis of Big Data Privacy Preservation Techniques and Challenges

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Abstract

In the present age, diversified data—both structured and unstructured, is being produced in huge amounts from sources like database transactions, audios, images, videos, social online platforms, etc., and that too within a time period of a millionth of a second. While this data is consumed and stored in large volumes, it is quite complex in nature and is growing within the constraints of self-regulatory sources. As a result, conventional procedures of data analysis and management fail in successfully managing the large data sets, collectively called as big data. Henceforth, by using a variety of techniques in the domain of data mining on large data sets, useful information is obtained, but this process is as meticulous as it is challenging. One of the biggest challenges, among others, is maintaining data privacy and to restrict unauthorized access to sensitive data generated, exchanged or recorded in banking transactions, health sector procedures, user interactions on social media as online presence and dependency of users has exponentially increased along with proliferation of sensitive information. This paper presents research insights into challenges in big data mining and the privacy concerns in big data besides presenting gaps in the research that can be used to plan future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. U. Ahsan, A.A. Bais, Review on big data analysis and Internet of things, in 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (IEEE, 2016), pp. 325–330. https://doi.org/10.1109/mass.2016.38

  2. N. Chakraborty, S. Gonnade, Big data and big data mining: study of approaches, issues and future scope. Int. J. Eng. Trends Technol. 18, 221–223 (2014)

    Article  Google Scholar 

  3. I. Kalbandi, J.A. Anuradha, Brief introduction on big data 5Vs characteristics and Hadoop technology, in Procedia Computer Science 48: International Conference on Computer, Communication and Convergence (ICCC 2015), vol. 48 (2015), pp. 319–324

    Google Scholar 

  4. P.G. Sawant, B.L. Desai, Big data mining: challenges and opportunities to forecast future scenario. Int. J. Innov. Technol. Explor. Eng. 3, 5228–5232 (2015)

    Google Scholar 

  5. S. Madan, K. Bhardwaj, S. Gupta, A literature analysis on big data paving its way to E-business, in Emerging Trends in Information Technology (2019). ISBN 978-93-89165-99-9

    Google Scholar 

  6. I.A.T. Hashem et al., The rise of ‘big data’ on cloud computing: review and open research issues. Inf. Syst. 47, 98–115 (2015)

    Article  Google Scholar 

  7. S. Sagiroglu, D. Sinanc, Big data: a review, in 2013 International Conference on Collaboration Technologies and Systems (CTS) (IEEE, 2013), pp. 42–47

    Google Scholar 

  8. H. Dev, T. Sen, M. Basak, M.E. Ali, An approach to protect the privacy of cloud data from data mining based attacks, in 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (IEEE, 2013), pp. 1106–1115. https://doi.org/10.1109/sc.companion.2012.133

  9. D.K. Singh, V. Swaroop, Data security and privacy in data mining: research issues & preparation. Int. J. Comput. Trends Technol. 4, 194–200 (2013)

    Google Scholar 

  10. A. Sameer, Big data and data mining a study of (characteristics, factory work, security threats and solution for big data, data mining architecture, challenges & solutions with big data), in Advancing Web Paging Techniques (2016), pp. I–XXVI. https://doi.org/10.13140/rg.2.1.3238.9525

  11. M.R. Choopa, Data mining and security in big data. Int. J. Adv. Res. Comput. Eng. Technol. 4, 1065–1069 (2015)

    Google Scholar 

  12. S.M. Nargundi, R. Phalnikar, Data DE-identification tool for privacy preserving data mining. Int. J. Comput. Sci. Eng. Inf. Technol. Res. 3, 267–276 (2013)

    Google Scholar 

  13. L. Hbibi, H. Barka, Big data: framework and issues, in 2016 International Conference on Electrical and Information Technologies (ICEIT) (IEEE, 2016), p. 6

    Google Scholar 

  14. S. Srijayanthi, R. Sethukkarasi, A comprehensive survey on privacy preserving big data mining. Int. J. Comput. Appl. Technol. Res. 6, 79–86 (2017)

    Google Scholar 

  15. M. Kaushik, A. Jain, Challenges to big data security and privacy. Int. J. Comput. Sci. Inf. Technol. 5, 3042–3043 (2014)

    Google Scholar 

  16. M. Smith, C. Szongott, B. Henne, G. Von Voigt, Big data privacy issues in public social media, in 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) (IEEE, 2013), p. 6

    Google Scholar 

  17. G. Geethakumari, A. Srivatsava, Big data analysis for implementation of enterprise data security. Int. J. Comput. Sci. Inf. Technol. Secur. 2, 742–746 (2012)

    Google Scholar 

  18. K.U. Jaseena, J.M. David, Issues, challenges, and solutions: big data mining, in Sixth International Conference on Networks & Communications (2014), pp. 131–140

    Google Scholar 

  19. S. Kim, I. Lee, Data block management scheme based on secret sharing for HDFS, in 10th International Conference on Broadband and Wireless Computing, Communication and Applications Data (IEEE, 2015), pp. 51–56. https://doi.org/10.1109/bwcca.2015.70

  20. S. Kaisler, F. Armour, J.A. Espinosa, W. Money, Big data: issues and challenges moving forward, in 2013 46th Hawaii International Conference on System Sciences (IEEE, 2013), pp. 995–1004. https://doi.org/10.1109/hicss.2013.645

  21. L. Xu, C. Jiang, J. Wang, J. Yuan, Y. Ren, Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2014)

    Article  Google Scholar 

  22. A. Katal, M. Wazid, R.H. Goudar, Big data: issues, challenges, tools and good practices, in 2013 Sixth International Conference on Contemporary Computing (IC3) (IEEE, 2013), pp. 404–409

    Google Scholar 

  23. N.I. Hussain, B. Choudhury, S. Rakshit, A novel method for preserving privacy in big-data mining. Int. J. Comput. Appl. 103, 21–25 (2014)

    Google Scholar 

  24. S. Vennila, J. Priyadarshini, Scalable privacy preservation in big data a survey, in 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15), ed. by V. Vijayakumar, V. Neelanarayanan. Procedia Comput. Sci. 50, 369–373 (Elsevier B.V) (2015)

    Google Scholar 

  25. X. Wu, X. Zhu, S. Member, Data mining with big data. IEEE Trans. Knowl. Data Eng. 26, 97–107 (2014)

    Article  Google Scholar 

  26. S. Salini, S.V. Kumar, R. Neevan, Survey on data privacy in big data with K-anonymity. Int. J. Innov. Res. Comput. Commun. 3, 3765–3771 (2015)

    Article  Google Scholar 

  27. S. Madan, P. Goswami, A novel technique for privacy preservation using K-anonymization and nature inspired optimization algorithms, in International Conference on Sustainable Computing in Science, Technology & Management (2019)

    Google Scholar 

  28. M. Balusamy, Data anonymization through generalization using map reduce on cloud, in 2014 IEEE International Conference on Computer Communication and Systems (ICCCS ‘14) (IEEE, 2014), pp. 39–42

    Google Scholar 

  29. A. Gosain, N. Chugh, Privacy preservation in big data. Int. J. Comput. Appl. 100, 44–47 (2014)

    Google Scholar 

  30. M. Sangeetha, P. Anishprabu, S. Shanmathi, Homomorphic encryption schema for privacy preserving mining of association rules. Int. J. Innov. Res. Sci. Eng.

    Google Scholar 

  31. B.C.M. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in ICDE ‘05 Proceedings of the 21st International Conference on Data Engineering (IEEE, 2005), pp. 205–2016

    Google Scholar 

  32. I. Sridhar, P. Jacob, Secure two party high dimensional private data using data mash up. Int. J. Comput. Sci. Inf. Technol. 5, 644–645 (2014)

    Google Scholar 

  33. K. Liang, W. Susilo, J.K. Liu, Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10, 1–11 (2015)

    Article  Google Scholar 

  34. P.C. Kaur, T. Ghorpade, V. Mane, Analysis of data security by using anonymization techniques, in 2016 6th International Conference—Cloud System and Big Data Engineering (Confluence) (IEEE, 2016), pp. 287–293

    Google Scholar 

  35. K. Rodiya, P. Gill, A review on anonymization techniques for privacy preserving data publishing. Int. J. Eng. Res. Technol. 4, 228–231 (2015)

    Google Scholar 

  36. S. Lohiya, L. Ragha, Privacy preserving in data mining using hybrid approach, in 2012 Fourth International Conference on Computational Intelligence and Communication Networks (IEEE, 2012), pp. 743–746. https://doi.org/10.1109/cicn.2012.166

  37. S. Madan, P. Goswami, K-DDD measure and MapReduce based anonymity model for secured privacy preserving big data publishing. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 27(2), 177–199 (2019)

    Google Scholar 

  38. S. Madan, P. Goswami, Nature inspired computational intelligence implementation for privacy preservation in MapReduce framework. IJIIDS 13(2/3/4), 191–207 (2020). https://doi.org/10.1504/IJIIDS.2020.109455

  39. S. Madan, P. Goswami, A privacy preservation model for big data in map-reduced framework based on k-anonymization and swarm-based algorithms. IJIEI 8(1), 38–53 (2020). https://doi.org/10.1504/IJIEI.2020.105433

    Article  Google Scholar 

  40. M. Du, K. Wang, Y. Chen, X. Wang, Y. Sun, Big data privacy preserving in multi-access edge computing for heterogeneous Internet of things. IEEE Commun. Mag. 56, 62–67 (2018)

    Article  Google Scholar 

  41. A. Al-Shomrani, F. Eassa, K. Jambi, Big data security and privacy challenges. Int. J. Eng. Dev. Res (IJEDR) 6(1), 894–900 (2018). ISSN: 2321-9939. http://www.ijedr.org/papers/IJEDR1801155.pdf

  42. D. Gottesman, I.L. Chuang, Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature 402(6760), 390–393 (1999)

    Article  Google Scholar 

  43. S. Barz, E. Kashefi, A. Broadbent, J.F. Fitzsimons, A. Zeilinger, P. Walther, Demonstration of blind quantum computing. Science 335(6066), 303–308 (2012)

    Article  MathSciNet  Google Scholar 

  44. B.C.M. Fung, K. Wang, R. Chen, P.S. Yu, Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010). Art. No. 14

    Google Scholar 

  45. Advances in Computational Psychophysiology. Accessed on 17 May 2016. [Online]. http://www.sciencemag.org/custompublishing/collections/advances-computational-psychophysiology

  46. S. Yu, Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016). https://doi.org/10.1109/ACCESS.2016.2577036

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Madan, S., Bhardwaj, K., Gupta, S. (2022). Critical Analysis of Big Data Privacy Preservation Techniques and Challenges. In: Khanna, A., Gupta, D., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1394. Springer, Singapore. https://doi.org/10.1007/978-981-16-3071-2_23

Download citation

Publish with us

Policies and ethics