scispace - formally typeset
Journal ArticleDOI

Toward efficient and privacy-preserving computing in big data era

Reads0
Chats0
TLDR
The general architecture of big data analytics is formalized, the corresponding privacy requirements are identified, and an efficient and privacy-preserving cosine similarity computing protocol is introduced as an example in response to data mining's efficiency and privacy requirements in the big data era.
Abstract
Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, and many research efforts have been directed to big data processing due to its high volume, velocity, and variety (referred to as "3V") challenges. However, in addition to the 3V challenges, the flourishing of big data also hinges on fully understanding and managing newly arising security and privacy challenges. If data are not authentic, new mined knowledge will be unconvincing; while if privacy is not well addressed, people may be reluctant to share their data. Because security has been investigated as a new dimension, "veracity," in big data, in this article, we aim to exploit new challenges of big data in terms of privacy, and devote our attention toward efficient and privacy-preserving computing in the big data era. Specifically, we first formalize the general architecture of big data analytics, identify the corresponding privacy requirements, and introduce an efficient and privacy-preserving cosine similarity computing protocol as an example in response to data mining's efficiency and privacy requirements in the big data era.

read more

Citations
More filters
Journal ArticleDOI

Critical analysis of Big Data challenges and analytical methods

TL;DR: In this article, the authors present a state-of-the-art review that presents a holistic view of the BD challenges and BDA methods theorized/proposed/employed by organizations to help others understand this landscape with the objective of making robust investment decisions.
Journal ArticleDOI

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

TL;DR: By sacrificing modest computation resources to save communication bandwidth and reduce transmission latency, fog computing can significantly improve the performance of cloud computing.
Journal ArticleDOI

Big data analytics: a survey

TL;DR: The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data.
Journal ArticleDOI

Differential Privacy Techniques for Cyber Physical Systems: A Survey

TL;DR: This paper surveys the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT).
Journal ArticleDOI

Big healthcare data: preserving security and privacy

TL;DR: The state-of-the-art security and privacy challenges in big data as applied to healthcare industry are surveyed, howSecurity and privacy issues occur in case of big healthcare data are assessed and ways in which they may be addressed are discussed.
References
More filters
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI

Data mining with big data

TL;DR: A HACE theorem is presented that characterizes the features of the Big Data revolution, and a Big Data processing model is proposed, from the data mining perspective, which involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations.
Journal ArticleDOI

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications

TL;DR: This paper proposes an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications that resists various security threats and preserve user privacy, and has significantly less computation and communication overhead than existing competing approaches.
Journal ArticleDOI

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

TL;DR: An efficient user-centric privacy access control in SPOC framework is introduced, which is based on an attribute-based access control and a new privacy-preserving scalar product computation (PPSPC) technique, and allows a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data.
Journal ArticleDOI

Toward privacy-assured and searchable cloud data storage services

TL;DR: This article identifies the system requirements and challenges toward achieving privacy-assured searchable outsourced cloud data services, especially, how to design usable and practically efficient search schemes for encrypted cloud storage, and presents a general methodology for this using searchable encryption techniques.
Related Papers (5)