Big Data Research ›› 2017, Vol. 3 ›› Issue (5): 45-56.doi: 10.11959/j.issn.2096-0271.2017051
• Topic:big data security and privacy protection • Previous Articles Next Articles
Xianjin FANG,Yafei XIAO,Gaoming YANG
Online:
2017-09-20
Published:
2017-10-24
Supported by:
CLC Number:
Xianjin FANG, Yafei XIAO, Gaoming YANG. Privacy preserving in the age of big data[J]. Big Data Research, 2017, 3(5): 45-56.
[1] | 张华平, 孙梦姝, 张瑞琦 ,等. 微博博主的特征与行为大数据挖掘[J]. 中国计算机学会通讯, 2014,10(6): 36-43. |
ZHANG H P , SUN M S , ZHANG R Q ,et al. Micro-blog blogger's characteristics and behavior big data mining[J]. Communications of the CCF, 2014,10(6): 36-43. | |
[2] | 张俊, 萧小奎 . 数据分享中的差分隐私保护[J]. 中国计算机学会通讯, 2014,10(6): 44-51. |
ZHANG J , XIAO X K . Differential privacy protection based on data share[J]. Communications of the CCF, 2014,10(6): 44-51. | |
[3] | 刘雅辉, 张铁赢, 靳小龙 ,等. 大数据时代的个人隐私保护[J]. 计算机研究与发展, 2015,52(1): 229-247. |
LIU Y H , ZHANG T Y , JIN X L ,et al. Personal privacy protection in the era of big data[J]. Journal of Computer Research and Development, 2015,52(1): 229-247. | |
[4] | 董诚, 林立, 金海 ,等. 医疗健康大数据:应用实例与系统分析[J]. 大数据, 2015(2):2015021. |
DONG C , LIN L , JIN H ,et al. Big data in healthcare:applications and system analytics[J]. Big Data Research, 2015(2):2015021. | |
[5] | 俞国培, 包小源, 黄新霆 ,等. 医疗健康大数据的种类、性质及有关问题[J]. 医学信息学杂志, 2014,35(6): 9-12. |
YU G P , BAO X Y , HUANG X T ,et al. Medical and health big data:types,characteristics and relevant issues[J]. Journal of Medical Intelligence, 2014,35(6): 9-12. | |
[6] | 刘向宇, 王斌, 杨晓春 . 社会网络数据发布隐私保护技术综述[J]. 软件学报, 2014,25(3): 576-590. |
LIU X Y , WANG B , YANG X C . Survey on privacy preserving techniques for publishing social network data[J]. Journal of Software, 2014,25(3): 576-590. | |
[7] | 熊平, 朱天清, 王晓峰 . 差分隐私保护及其应用[J]. 计算机学报, 2014,37(1): 101-122. |
XIONG P , ZHU T Q , WANG X F . A survey on differential privacy and applications[J]. Chinese Journal of Computers, 2014,37(1): 101-122. | |
[8] | 张啸剑, 孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014,37(4): 927-949. |
ZHANG X J , MENG X F . Differential privacy in data publication and analysis[J]. Chinese Journal of Computers, 2014,37(4): 927-949. | |
[9] | YU S . Big privacy:challenges and opportunities of privacy study in the age of big data[J]. IEEE Access, 2016(4): 2752-2763. |
[10] | 彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903. |
PENG C G , DING H F , ZHU Y J ,et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8): 1891-1903. | |
[11] | DWORK C , . Differential privacy[C]// The 33rd International Colloquium on Automata,Languages and Programming,July 10-14,2006,Venice,Italy. Venice:Springer-Verlag, 2006: 1-12. |
[12] | DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis[C]// The 3rd Conference on Theory of Cryptography,March 4-7,2006,New York,USA. New York:Springer, 2006: 265-284. |
[13] | MCSHERRY F , TALWAR K . Mechanism design via differential privacy[C]// The 48th Annual IEEE Symposium on Foundations of Computer Science,October 21-23,2007,Providence,USA. New Jersey:IEEE Press, 2007: 94-103. |
[14] | BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55. |
[15] | GHINITA G . Private queries and trajectory anonymization:a dual perspective on location privacy[J]. IEEE Transaction on Data Privacy, 2009,2(1): 3-19. |
[16] | KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6): 391-399. |
[17] | HUO Z . A survey of trajectory privacy preserving techniques[J]. Chinese Journal of Computers, 2011,34(10): 1820-1830. |
[18] | SHIN K G , JU X , CHEN Z ,et al. Privacy protection for users of locationbased services[J]. IEEE Wireless Communications, 2012,19(1): 30-39. |
[19] | 张学军, 桂小林, 伍忠东 . 位置服务隐私保护研究综述[J]. 软件学报, 2015,26(9): 2373-2395. |
ZHANG X J , GUI X L , WU Z D . Privacy preservation for location-based services:a survey[J]. Journal of Software, 2015,26(9): 2373-2395. | |
[20] | 周长利, 马春光, 杨松涛 . 路网环境下保护LBS位置隐私的连续KNN查询方法[J]. 计算机研究与发展, 2015,52(11): 2628-2644. |
ZHOU C L , MA C G , YANG S T . Location privacy-preserving method for lbs continuous knn query in road networks[J]. Journal of Computer Research and Development, 2015,52(11): 2628-2644. | |
[21] | 倪巍伟, 陈萧, 马中希 . 支持偏好调控的路网隐私保护k近邻查询方法[J]. 计算机学报, 2015,38(4): 884-896. |
NI W W , CHEN X , MA Z X . Location privacy preserving k nearest neighbor query method on road network in presence of user's preference[J]. Chinese Journal of Computers, 2015,38(4): 884-896. | |
[22] | 倪巍伟, 陈萧 . 保护位置隐私近邻查询中隐私偏好问题研究[J]. 软件学报, 2016,27(7): 1805-1821. |
NI W W , CHEN X . User privacy preference support in location privacy-preserving nearest neighbor query[J]. Journal of Software, 2016,27(7): 1805-1821. | |
[23] | 王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4): 693-712. |
WANG L , MENG X F . Location privacy preservation in big data era:a survey[J]. Journal of Software, 2014,25(4): 693-712. | |
[24] | GOTTESMAN D , CHUANG I L . Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations[J]. Nature, 1999,402(6760): 390-393. |
[25] | BARZ S , KASHEFI E , BROADBENT A ,et al. Demonstration of blind quantum computing[J]. Science, 2012,335(6066): 303-308. |
[26] | 张伊璇, 何泾沙, 赵斌 ,等. 一个基于博弈理论的隐私保护模型[J]. 计算机学报, 2016,39(3): 615-627. |
ZHANG Y X , HE J S , ZHAO B ,et al. A privacy protection model base on game theory[J]. Chinese Journal of Computers, 2016,39(3): 615-627. |
[1] | Haihong QIAN, Maoyi WANG, Yun XIONG. Digital transformation in higher education:a systematic review [J]. Big Data Research, 2023, 9(3): 56-70. |
[2] | Huicong JIAO, Wenju LIU, Ze WANG. Trajectory differential privacy protection method based on exponential mechanism [J]. Big Data Research, 2023, 9(1): 141-152. |
[3] | Hong MEI, Xiaoyong DU, Hai JIN, Xueqi CHENG, Yunpeng CHAI, Xuanhua SHI, Xiaolong JIN, Yasha WANG, Chi LIU. Big data technologies forward-looking [J]. Big Data Research, 2023, 9(1): 1-20. |
[4] | Yang SHEN, Menglong YU. Metaverse and big data: data insight and value connection in spatio-temporal intelligence [J]. Big Data Research, 2023, 9(1): 103-110. |
[5] | Tongzheheng ZHENG, Bin LI, Minxuan FENG, Bolin CHANG, Dongbo WANG. Explore the structuration of historical books:the construction and quantitative analysis of digital humanities database of the Biographies of the Shiji [J]. Big Data Research, 2022, 8(6): 40-55. |
[6] | Jing CHEN. Humanities big data and its application in the field of digital humanities [J]. Big Data Research, 2022, 8(6): 3-14. |
[7] | Yuchu LUO, Hao WU, Yuhan GUO, Shaocong TAN, Can LIU, Ruike JIANG, Xiaoru YUAN. Visualization in digital humanities [J]. Big Data Research, 2022, 8(6): 74-93. |
[8] | Ming LI, Abin LYU. Exploration and practice of privacy preserving computing for vehicle-road collaboration system [J]. Big Data Research, 2022, 8(5): 74-87. |
[9] | Wenlong LI, Yuan YUAN, Xiaopeng AN. Modus operandi of big data governance: some preliminary observations [J]. Big Data Research, 2022, 8(4): 34-45. |
[10] | Qifeng TANG, Zhiqing SHAO, Yazhen YE. Authenticating and licensing architecture of data rights in data trade [J]. Big Data Research, 2022, 8(3): 40-53. |
[11] | Chenhuizi WANG, Wei CAI. Digital economics in metaverse: state-of-the-art, characteristics, and vision [J]. Big Data Research, 2022, 8(3): 140-150. |
[12] | Mei YANG, Wei LI, Siyuan QIAO, Wei LIU. Research on calculation method of China’s big data industry output value [J]. Big Data Research, 2022, 8(3): 151-160. |
[13] | Deren LI, Guo ZHANG, Yonghua JIANG, Xin SHEN, Weiling LIU. Opportunities and challenges of geo-spatial information science from the perspective of big data [J]. Big Data Research, 2022, 8(2): 3-14. |
[14] | Xiaolan QIU, Yuxin HU, Songtao SHANGGUAN, Kun FU. Remote sensing satellite big data high-recision integration processing technology [J]. Big Data Research, 2022, 8(2): 15-27. |
[15] | Weiquan LIU, Cheng WANG, Yu ZANG, Qian HU, Shangshu YU, Baiqi LAI. A survey on information extraction technology based on remote sensing big data [J]. Big Data Research, 2022, 8(2): 28-57. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|