Loading [MathJax]/extensions/MathZoom.js
Big Data Privacy and Challenges for Machine Learning | IEEE Conference Publication | IEEE Xplore

Big Data Privacy and Challenges for Machine Learning


Abstract:

The field of Big Data is expanding at an alarming rate since its inception in 2012. The excessive use of Social Networking Sites, collection of Data from Sensors for anal...Show More

Abstract:

The field of Big Data is expanding at an alarming rate since its inception in 2012. The excessive use of Social Networking Sites, collection of Data from Sensors for analysis and prediction of future events, improvement in Customer Satisfaction on Online S hopping portals by monitoring their past behavior and providing them information, items and offers of their interest instantaneously, etc had led to this rise in the field of Big Data. This huge amount of data, if analyzed and processed properly, can lead to decisions and outcomes that would be of great values and benefits to organizations and individuals. Security of Data and Privacy of User is of keen interest and high importance for individuals, industry and academia. Everyone ensure that their Sensitive information must be kept away from unauthorized access and their assets must be kept safe from security breaches. Privacy and Security are also equally important for Big Data and here, it is typical and complex to ensure the Privacy and Security, as the amount of data is enormous. One possible option to effectively and efficiently handle, process and analyze the Big Data is to make use of Machine Learning techniques. Machine Learning techniques are straightforward; applying them on Big Data requires resolution of various issues and is a challenging task, as the size of Data is too big. This paper provides a brief introduction to Big Data, the importance of Security and Privacy in Big Data and the various challenges that are required to overcome for applying the Machine Learning techniques on Big Data.
Date of Conference: 07-09 October 2020
Date Added to IEEE Xplore: 10 November 2020
ISBN Information:
Conference Location: Palladam, India
References is not available for this document.

I. Introduction

The recent trends and technological developments in the field of networking, computing and telecommunications have led to the generation of an enormous amount of data every day. This enormous amount of data is being generated through various sources like Social Networking Sites, Scientific Research and Computations, Sensor-based Systems, Internet, Government Organizations, Digitization Initiatives, Customer Feedbacks, Reviews, Blogs and many more. This enormous amount of data generated through various Sources in high Volume and different formats and different types is referred to as the “Big Data” [1] [2]. This enormous amount of data is available in various types, such as Text, Videos, Audios, Images, Graphs and others [3].

Select All
1.
A. Mehmood, I. Natgunanathan, Y. Xiang, G. Hua and S. Guo, "Protection of Big Data Privacy" in Special Section on Theoretical Foundations for Big Data Applications: Challenges and Opportunities, IEEE ACCESS, vol. 4, pp. 1821-1834, 2016.
2.
R. Kune, P. K. Konugurthi, A. Agarwal, R. R. Chillarige and R. Buyya, "TheAnatomy of Big Data Computing" in Journal of Software: Practice and Experience, Wiley, vol. 46, pp. 79-105, 2015.
3.
C. Nalini and A. R. Arunachalam, "A Study on Privacy Preserving Techniques in Big Data Analytics", International Journal of Pure and Applied Mathematics, vol. 116, no. 10, pp. 281-286, 2017.
4.
P. Jain, M. Gyanchandani and N. Khare, "Big Data Privacy: A Technological Perspective and Review" in Journal of Big Data, SPRINGER, vol. 3, no. 25, 2016.
5.
W. Fang, X. Z. Wen, Y. Zheng and M. Zhou, "A Survey of Big Data Security and Privacy Preserving" in IETE Technical Review, Taylorand Francis, 2016.
6.
N. Joshi and B. Kadhiwala, "Big Data Security and Privacy Issues - A Survey", Proceedings of International Conference on Innovations in Power and Advanced Computing Technologies (i-PACT), 2017.
7.
K. Karthiban and J. S. Raj, "Big Data Analytics for Developing Secure Internet of Everything", Journal of ISMAC, vol. 1, no. 2, pp. 129-136, 2019.
8.
N. Victor, D. Lopezand and J. H. Abawajy, "Privacy Models for Big Data: A Survey" in International Journal of Big Data Intelligence, InderScience, vol. 3, no. 1, pp. 61-75, 2016.
9.
D. S. Terzi, R. Terzi and S. Sagiroglu, "A Survey on Security and Privacy Issues in Big Data", Proceedings of 10th International Conference on Internet Technology and Secured Transactions (ICITST), pp. 202-207, 2015.
10.
V. N. Inukollu, S. Arsi and S. R. Ravuri, "Security Issues associated with Big Data in Cloud Computing", International Journal of Network Security and its Applications, vol. 6, no. 3, pp. 45-56, May 2014.
11.
A. D. Mishra and Y. B. Singh, "Big Data Analytics for Security and Privacy Challenges", Proceedings of International Conference on Computing Communication and Automation (ICCCA), pp. 50-53, 2016.
12.
E. Bertino, "Big Data - Security and Privacy", Proceedings of IEEE International Congress on Big Data, pp. 757-761, 2015.
13.
Z. Sun, K. D. Strang and F. Pambel, "Privacy and Security in the Big Data Paradigm" in Journal of Computer Information Systems, Taylorand Francis, 2018.
14.
S. Yu, "Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data", IEEE ACCESS, vol. 4, pp. 2751-2763, 2016.
15.
R. Bao, Z. Chen and M. S. Obaidat, "Challenges and Techniques in Big DataSecurity and Privacy: A Review" in Journal of Security and Privacy, Wiley, vol. 2, no. 13, 2018.
16.
Q. Zhang, L. T. Yang, Z. Chen and P. Li, "PPHOPCM: Privacy-Preserving High-Order Probabilistic C-Means Algorithm for Big Data Clustering with Cloud Computing", IEEE Transactions on Big Data, 2017.
17.
D. Bogdanov, L. Kamm, S. Laur and V. Sokk, "Rmind: A Tool for Cryptographically Secure Statistical Analysis", IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 3, pp. 481-495, 2016.
18.
J. Han, W. Susilo, Y. Mu, J. Zhou and M. H. Au, "Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption", IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 665-678, 2015.
19.
A. Gosain and N. Chugh, "Privacy Preservation in Big Data", International Journal of Computer Applications, vol. 100, no. 17, pp. 44-47, 2014.
20.
Y. Li, K. Gai, L. Qiu, M. Qiu and H. Zhao, "Intelligent Cryptography Approach for Secure Distributed Big Data Storage in Cloud Computing" in Journal of Information Sciences, ELSEVIER, vol. 387, pp. 103-115, 2017.
21.
M. A. P. Chamikara, P. Bertok, B. Liu, S. Camtepe and I. Khalil, "Efficient Privacy Preservation of Big Data for Accurate Data Mining" in Journal of Information Sciences, ELSEVIER, vol. 527, pp. 420-443, 2020.
22.
A. L'Heureux, K. Grolinger, H. F. ElYamany and M. A. M. Capretz, "Machine Leaming with Big Data: Challenges and Approaches", IEEE ACCESS, vol. 5, pp. 7776-7797, 2017.
23.
K. Xu, H. Yue, L. Guo, Y. Guo and Y. Fang, "Privacy-Preserving Machine Learning Algorithms for Big Data Systems", Proceedings of 35th IEEE International Conference on Distributed Computing Systems, pp. 318-327, 2015.
24.
R. M. Alguliyev, R. M. Aliguliyev and F. J. Abdullayeva, "Privacy-Preserving Deep Learning Algorithm for Big Personal Data Analysis" in Journal of Industrial Information Integration, ELSEVIER, vol. 15, pp. 1-14, 2019.
25.
D. Saidulu and R. Sasikala, "Machine Learning and Statistical Approaches for Big Data: Issues Challenges and Research Directions", International Journal of Applied Engineering Research, vol. 12, no. 21, pp. 11691-11699, 2017.
26.
G. B. Tarekegn and Y. Y. Munaye, "Big Data: Security Issues Challenges and Future Scope", International Journal of Computer Engineering and Technology, vol. 7, no. 4, pp. 12-24, 2016.

Contact IEEE to Subscribe

References

References is not available for this document.