Big Data Research ›› 2016, Vol. 2 ›› Issue (1): 1-18.doi: 10.11959/j.issn.2096-0271.2016001
• FOCUS • Next Articles
Binxing FANG1,2,Yan JIA2,Aiping LI2,Rong JIANG2
Online:
2016-01-20
Published:
2017-03-22
CLC Number:
Binxing FANG, Yan JIA, Aiping LI, Rong JIANG. Privacy preservation in big data:a survey[J]. Big Data Research, 2016, 2(1): 1-18.
[1] | 方滨兴, 刘克, 吴曼青 , 等. 大搜索技术白皮书[R/OL].(2015-01-06)[2015-05-23]. . |
FANG B , LIU K , WU M Q , et al. White paper on big search..(2015-01-06)[2015-05-23]. . | |
[2] | 周水庚, 李丰, 陶宇飞 , 等. 面向数据库应用的隐私保护研究综述[J]. 计算机学报, 2009,32(5):847-861. |
ZHOU S G , LI F , TAO Y F , et al. Privacy preservation in database applications:a survey[J]. Chinese Journal of Computers, 2009,32(5):847-861. | |
[3] | SAMARATI P , SWEENEY L . Generalizing data to provide anonymity when disclosing information[C]// Proceedings of the 17th ACM Sigact-Sigmod-Sigart Symposium on Principles of Database System,June 1-3,1998,Seattle,Washington, New York: ACM Press, 1998 |
[4] | SWEENY L . k-anonymity:amodel for protecting privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledge Based Systems, 2012,10(5):557-570 |
[5] | BARBARO M , ZELLER T . A face is exposed for AOL searcher No.4417749[N/OL]. New York Times,(2006-08-09) [2013-09-10]. . |
[6] | NARAYANAN A , SHMATIKOV V . How to break anonymity of the netflix prize dataset[J]. Eprint Arxiv Cs, 2006,arXiv:cs/0610105. |
[7] | MACHANAVAJJHALA A , GEHRKE J , KIFER D , et al. l-diversity:privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007,1(1):24 |
[8] | LI N , LI T , VENKATASUBRAMANIAN S . t-closeness:privacy beyond k-anonymity and l-diversity[C]// Proceedings of IEEE 23rd International Conference on Data Engineering,April 11-15,2007,Istanbul,Turkey. Piscataway: IEEE Press, 2007:106-115. |
[9] | NIU B , LI Q H , ZHU X Y , et al. Enhancing privacy through caching in location-based services[C]// Proceedings of IEEE INFOCOM,April 26-May 1,2015,Hong Kong,China, 2015:1017-1025. |
[10] | LI A , JIN S , ZHANG L , et al. A sequential decision-theoretic model for medical diagnostic system[J]. Technology and Health Care, 2015,23(s1):S37-S42. |
[11] | BYUN J W , SOHN Y , BERTINO E , et al. Secure anonymization for incremental dataset[C]// Proceedings of the 3rd VLDB Workshop on Secure Data Management (SDM),September 10-11,2006,Seoul,Korea.[S.l.:s.n.], 2006. |
[12] | XIAO X K , TAO Y F . m-invariance:towards privacy preserving re-publication of dynamic datasets[C]// Proceedings of the 2007,ACM SIGMOD International Conference on Management of Data,June 12-14,2007,Beijing,China, New York: ACM Press, 2007:689-700. |
[13] | BU Y Y , FU A W C , WONG R C W , et al. Privacy preserving serial data publishing by role composition[C]// Proceedings of the 34th International Conference on Very Large Data Bases,August 23-28,2008,Auckland,New Zealand.[S.l.:s.n.], 2008:845-856. |
[14] | ZHANG X , LIU C , NEPAL S , et al. A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud[J]. Journal of Computer & System Sciences, 2014,80(5):1008-1020. |
[15] | ZHANG X , LIU C , NEPAL S , et al. Combining top-down and bottom-up:scalable sub-tree anonymization over big data using MapReduce on cloud[J]. IEEE International Conference on Trust, 2013,52(1):501-508. |
[16] | MOHAMMADIAN E , NOFERESTI M , JALILI R . FAST:fast anonymization of big data streams[C]// Proceedings of the 2014 International Conference on Big Data Science and Computing,Aug 4-7,2014,Beijing,China.[S.l.:s.n.], 2014. |
[17] | SEDAYAO J , BHARDWAJ R , GORADE N . Making big data,privacy,and anonymization work together in the enterprise:experiences and issues[C]// Proceedings of the 3rd International Congress on Big Data,June 27-July 2,2014,Anchorage,Alaska,USA, Piscataway: IEEE Press, 2014. |
[18] | SUN G Z , WEI S , XIE X . De-anonymization technology and applications in the age of big data[J]. Information&Communications Technologies, 2013(6):52-57 |
[19] | NARAYANAN A , SHMATIKOV V . Robust de-anonymization of large sparse datasets[C]// Proceedings of the 2008 IEEE Symposium on Security and Privacy,May 18-21,2008,Oakland,USA. Piscataway: IEEE Press, 2008:111-122. |
[20] | National Bureau of Standards. Proposed federal information processing data encryption standard[J]. Creptologia, 1977,1(3):292-306. |
[21] | FIPS. Advanced encryption standard (AES):FIPS PUB 197[S/OL].[2010-10-16]. . |
[22] | RIVEST R L , SHAMIR A , ADLERNAN L M . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(6):120-126. |
[23] | ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4):469-472. |
[7] | LIN H Y , SHEN S T , TZENG W G , et al. Toward data confidentiality via integrating hybrid encryption schemes and Hadoop distributed file system.[C]// Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications (AINA),March 26-29,2012,Fukuoka,Japan, Washington DC: IEEE Computer Society Press, 2012:740-747. |
[25] | GENTRY C . A fully homomorphic encryption scheme [D]. Palo Alto:Stanford University, 2009. |
[26] | VAN DIJK M , GENTRY C , HALEVI S , et al. Fully homomorphic encryption over the integers[C]// Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques,May 30-June 3,2010,Riviera,French, New York: Springer Berlin Heidelberg, 2010:24-43. |
[27] | CHEN X , HUANG Q . The data protection of MapReduce using homomorphic encryption[C]// Proceedings of the 4th IEEE International Conference on Software Engineering and Service Science (ICSESS),May 23-25,2013,Beijing,China. Piscataway: IEEE Press, 2013:419-421. |
[28] | WANG B Y , LI B C , LI H . Public auditing for shared data with efficient user revocation in the cloud[C]// Proceedings of IEEE INFOCOM,April 26-May 1,2015,Hong Kong,China. Piscataway: IEEE Press, 2015:2904-2912. |
[29] | ATENIESE G , BURNS R , CURMOLA R , et al. Provable data possession at untrusted stores[J]. ACM Conference on Computer & Communications Security, 2007,14(1):598-609. |
[30] | JUELS A , KALISKI B S . PORs:proofs of retrievability for large files[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security,October 29-November 2,2007,Alexandria,VA,USA., New York: ACM Press, 2007:584-597. |
[31] | SHACHAM H , WATERS B . Compact proofs of retrievability[J]. Journal of Cryptology, 2013,26(3):442-483. |
[32] | ATENIESE G , PIETRO R , MANCIN L V , et al. Scalable and efficient provable data possession[C]// Proceedings of International Conference on Security &Privacy in Communication Networks,September 22-25,2008,Istanbul,Turkey., New York: ACM Press, 2008. |
[33] | ERWAY C , KüP?ü A , PAPAMANTHOU C , et al. Dynamic provable data possession[C]// Proceedings of the 16th ACM Conference on Computer and Communications Security,November 9-13,2009,Chicago,IL,USA. New York: ACM Press, 2009:213-222. |
[34] | WANG Q , WANG C , LI J , et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// Proceedings of ESORICS,September 21-25,2009,Saint Malo,France.[S.l.:s.n.], 2009:355-370. |
[35] | WANG C , WANG Q , REN K , et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of IEEE INFOCOM,March 15-19,2010,San Diego,CA,USA., Piscataway: IEEE Press, 2010:525-533 |
[36] | WANG B Y , LI B C , LI H . Oruta:privacy preserving public auditing for shared data in the cloud[C]// Proceedings of IEEE 5th International Conference on Cloud Computing,November 22-24,2012,Honolulu,Hawaii,USA. Piscataway: IEEE Press, 2012:295-302. |
[37] | WANG B Y , LI B C , LI H . Knox:privacy preserving auditing for shared data with large groups in the cloud[C]// Proceedings of the 10th International Conference on Applied Cryptography and Network Security,June 26-29,2012,Singapore., Berlin: Springer, 2012. |
[38] | THURAISINGHAM B . Big data security and privacy[C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy,March 2-4,2015,San Antonio,TX,USA., New York: ACM Press, 2015:279-280. |
[39] | WONG R . Big data privacy[J]. J Inform Tech SoftwEng, 2012(2):e114. |
[40] | WU X , ZHU Z , WU G Q , et al. Data mining with big data[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(1):97-107. |
[41] | AGGARWAL C C , PHILIP S Y . A General Survey of Privacy-Preserving Data Mining Models and Algorithms[M]. New York:Springer US, 2008. |
[42] | ATALLAH M , BERTINO E , ELMAGARMID A , et al. Disclosure limitation of sensitive rules[C]// Proceedings of Workshop on Knowledge and Data Engineering Exchange,November 7,1999,Chicago,IL,USA. Piscataway: IEEE Press, 1999:45-52. |
[43] | OLIVEIRA S R M , ZAIANE O R . Privacy preserving frequent itemset mining[C]// Proceedings of IEEE International Conference on Data Mining,Japan,December 9-12,2002,Maebashi City. Piscataway: IEEE Press, 2002:43-54. |
[44] | CHANG L W , MOSKOWITZ I S . An Integrated Framework for Database Inference and Privacy Protection[M]. Ifip Tc11/ Wg113 Fourteenth Working Conference on Database Security:Data &Application Security.New York:Springer US, 2000:161-172. |
[45] | AGGARWAL C , PEI J , ZHANG B . A framework for privacy preservation against adversarial data mining[C]// Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,August 20-23,2006,Philadelphia,USA., New York: ACM Press, 2006. |
[46] | AGRAWAL R , SRIKANT R . Privacy-preserving data mining[J]. ACM SIGMOD Record, 2000,29(2):439-450. |
[47] | MOSKOWITZ L W , CHANG I S . A Decision Theoretical Based System for Information Downgrading[R/OL].(2011-08-27)[2015-11-20]. . |
[48] | CHANG L W , MOSKOWITZ I S . Parsimonious downgrading and decision trees applied to the inference problem[C]// Proceedings of the 1998 Workshop on New Security Paradigms,Charlottesville,Virginia,USA,1998. New York: ACM Press, 1998:82-89. |
[49] | OLIVEIRA S R M , ZAIANE O R . Privacy preserving clustering by data transformation[J]. Journal of Information and Data Management, 2010,1(1):37. |
[50] | VAIDYA J , CLIFTON C . Privacy-preserving k-means clustering over vertically partitioned data[C]// Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,August 24-27,2003,Washington DC,USA., New York: ACM Press, 2003:206-215. |
[51] | SANDHU R S , SAMARATI P . Access control:principle and practice[J]. IEEE Communications Magazine, 1994,32(9):40-48. |
[52] | SANDHU R S . Lattice-based access control models[J]. Computer, 1993,26(11):9-19. |
[53] | ZHANG W , LI A , CHEEMA M , et al. Probabilistic n-of-N skyline computation over uncertain data streams[J]. World Wide Web, 2015,18(5):1331-1350. |
[54] | SANDHU R S , COYNE E J , FEINSTEIN H L , et al. Role-based access control models[J]. Computer, 1996(2):38-47. |
[55] | KUHLMANN M , SHOHAT D , SCHIMPF G . Role mining-revealing business roles for security administration using data mining technology[C]// Proceedings of the 8th ACM Symposium on Access Control Models and Technologies,June 2-3,2003,Como,Italy. New York: ACM Press, 2003:179-186. |
[56] | RAY I , KUMAR M , YU L J . LRBAC:a location-aware role-based access control model[C]// Proceedings of the 2nd International Conference on Information Systems Security,December 19-21,2006,Kolkata,India. New York: Springer US, 2006:147-161. |
[57] | DAMIANI M L , BERTINO E , CATANIA B , et al. Geo-rbac:a spatially aware rbac[J]. ACM Transactions on Information and System Security (TISSEC), 2007,10(1):2. |
[58] | 张颖君, 冯登国 . 基于尺度的时空RBAC模型[J]. 计算机研究与发展, 2015,47(7):1252-1260. |
ZHANG Y J , FENG D G . A role-based access control model based on space,time and scale[J]. Journal of Computer Research and Development, 2010,47(7):1252-1260. | |
[59] | ENE A , HORNE W , MILOSAVLJEVIC N , et al. Fast exact and heuristic methods for role minimization problems[C]// Proceedings of the 13th ACM Symposium on Access Control Models and Technologies,June 11-13,2008,Estes Park,CO,USA., New York: ACM Press, 2008:1-10. |
[60] | 翟志刚, 王建东, 曹子宁 , 等. 最小扰动混合角色挖掘方法研究[J]. 计算机研究与发展, 2015,50(5):951-960. |
ZHAI Z G , WANG J D , CAO Z N , et al. Hybrid role mining methods with minimal perturbation[J]. Journal of Computer Research and Development, 2015,50(5):951-960. | |
[61] | BLUNDO C , CIMATO S . A simple role mining algorithm[C]// Proceedings of the 2010 ACM Symposium on Applied Computing,March 22-26,2010,Sierre,Switzerland. New York: ACM Press, 2010:1958-1962. |
[62] | NINO V V . Role mining over big and noisy data theory and some applications[D]. Roma:Roma Tre University, 2011. |
[63] | FELTUS C , PETIT M , SLOMAN M . Enhancement of business it alignment by including responsibility components in RBAC[C]// Proceedings of the 5th International Workshop on Business/IT Alignment and Interoperability BUSITAL,June 2010,Hammamet,Tunisia.[S.l.:s.n.], 2010. |
[64] | Attribute-based access control.[EB/OL].[2015-12-08]. . |
[65] | GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security,October 30-November 3,2006,Alexandria,Virginia,USA, New York: ACM Press, 2006:89-98. |
[66] | BOBBA R , KHURANA H , PRABHAKARAN M . Attribute-sets:a practically motivated enhancement to attribute-based encryption[C]// Proceedings of the 14th European Symposium on Research in Computer Security,September 21-25,2009,Saint-Malo,France.[S.l.:s.t.], 2009:587-604. |
[67] | WAN Z , LIU J E , DENG R H . HASBE:a hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2):743-754. |
[68] | JIN X . Attribute-based access control models and implementation in cloud infrastructure as a service[D]. San Antonio:The University of Texas at San Antonio, 2014. |
[69] | LI A , HAN Y , ZHOU B , et al. Detecting hidden anomalies using sketch for high-speed network data stream monitoring[J]. Applied Mathematics and Information Sciences, 2012,6(3):759-765. |
[70] | YANG K , JIA X , REN K , et al. Enabling efficient access control with dynamic policy updating for big data in the cloud[C]// Proceedings of IEEE INFOCOM,April 27-May 2,2014,Toronto,Canada. Piscataway: IEEE Press, 2014:2013-2021. |
[71] | BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[C]// Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Espoo,May 13,1998,Finland. Finland: Berlin:Springer, 1998:127-144. |
[72] | LI A , XU J , GAN L , et al. An efficient approach on answering top-k queries with grid dominant graph index[C]// Proceedings of the 15th Asia-Pacific Web Conference,April 4-6,2013,Sydney, Berlin: Springer, 2013:804-814. |
[73] | ZHANG W M , CHEN B , YU N H . Improving various reversible data hiding schemes via optimal codes for binary covers[J]. IEEE Transactions on Image Processing, 2012,21(6):2991-3003. |
[74] | SUN W H , YU S C , LOU W J , et al. Protecting your right:attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[C]// Proceedings of IEEE Conference on Computer Communications,April 27-May 2,2014,Toronto,Ontario,Canada., Piscataway: IEEE Press, 2014. |
[75] | WANG Y C , LI F H , XIONG J B , et al. Achieving lightweight and secure access control in multi-authority cloud[C]// Proceedings of the 14th IEEE International Conference on Trust,Security and Privacy in Computing and Communications,August 20-22,2015,Helsinki,Finland. Piscataway: IEEE Press, 2015:459-466. |
[1] | Wenqiang RUAN, Mingxin XU, Xinyu TU, Lushan SONG, Weili HAN. Data tenancy: a new paradigm for data circulation [J]. Big Data Research, 2022, 8(5): 3-11. |
[2] | Jiantong HUO, Limin XIAO, Zhisheng HUO, Yaowen XU. Research and implementation of edge cache system in global virtual data space across WAN [J]. Big Data Research, 2021, 7(5): 57-81. |
[3] | Limin XIAO, Yao SONG, Guangjun QIN, Hanjie ZHOU, Chaobo WANG, Bing WEI, Wei WEI, Zhisheng HUO. GVDS: a global virtual data space for wide-area high-performance computing environments [J]. Big Data Research, 2021, 7(2): 123-146. |
[4] | Zhihui WANG, Xuchen ZHOU, Yun ZHU. Privacy preservation in self-governing openness of data [J]. Big Data Research, 2018, 4(2): 42-49. |
[5] | Haiying LI. Legal challenges and recommendations for big data [J]. Big Data Research, 2016, 2(2): 100-107. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|