Open Access   Article Go Back

A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms

Johny Antony P1 , Antony Selvadoss Thanamani2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 131-140, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.131140

Online published on Nov 30, 2018

Copyright © Johny Antony P, Antony Selvadoss Thanamani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Johny Antony P, Antony Selvadoss Thanamani, “A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.131-140, 2018.

MLA Style Citation: Johny Antony P, Antony Selvadoss Thanamani "A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms." International Journal of Computer Sciences and Engineering 6.11 (2018): 131-140.

APA Style Citation: Johny Antony P, Antony Selvadoss Thanamani, (2018). A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms. International Journal of Computer Sciences and Engineering, 6(11), 131-140.

BibTex Style Citation:
@article{P_2018,
author = {Johny Antony P, Antony Selvadoss Thanamani},
title = {A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {131-140},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3134},
doi = {https://doi.org/10.26438/ijcse/v6i11.131140}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.131140}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3134
TI - A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - Johny Antony P, Antony Selvadoss Thanamani
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 131-140
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
506 354 downloads 254 downloads
  
  
           

Abstract

Privacy preservation in big data is a need of the time because of the specialties of the data. Many researches have been made to tackle the issues of privacy in big data still some conflicts arises. Hence, an efficient method for the privacy preservation of data should be introduced. In this proposed work, a novel framework is designed for conserving the data in a secure manner. The personal and medical datasets are taken and are being merged which is under the control of hospital admin. This dataset is preprocessed to remove the noise following the normalization technique in order to convert the string into integers. Then, the efficient partial least square regression model is applied for the extraction of features such as sensitive and non-sensitive attributes. After the identification of this sensitive and non-sensitive attributes, ε-differential privacy preservation algorithm, the sensitive data are encrypted with the use of novel identity based encryption technique by generating the key. By the use of this code the user can decrypt the data which is anonymous format. The performance analysis is made on comparing the existing techniques which shows that the proposed methodology provides a better efficiency in terms of encryption cost, key generation cost, overall execution cost, security scheme, and computation complexity.

Key-Words / Index Term

Privacy preservation, Sensitive attributes, Non-sensitive attributes, ε-differential privacy preservation, encryption, Identity based encryption

References

[1] S. Ananthi and A. Periwal, "Data Security Based On Big Data Storage," Global Journal of Pure and Applied Mathematics, vol. 12, pp. 1491-1500, 2016.
[2] K. He, et al., "On the security of two identity-based conditional proxy re-encryption schemes," Theoretical Computer Science, vol. 652, pp. 18-27, 2016.
[3] S. Wang, et al., "Attribute-based data sharing scheme revisited in cloud computing," IEEE transactions on information forensics and security, vol. 11, pp. 1661-1673, 2016.
[4] A. Azaria, et al., "Medrec: Using blockchain for medical data access and permission management," in Open and Big Data (OBD), International Conference on, 2016, pp. 25-30.
[5] J. Luo, et al., "Big data application in biomedical research and health care: a literature review," Biomedical informatics insights, vol. 8, p. BII. S31559, 2016.
[6] I. A. T. Hashem, et al., "The rise of “big data” on cloud computing: Review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015.
[7] R. Kune, et al., "The anatomy of big data computing," Software: Practice and Experience, vol. 46, pp. 79-105, 2016.
[8] X. Wu, et al., "Data mining with big data," IEEE transactions on knowledge and data engineering, vol. 26, pp. 97-107, 2014.
[9] S. Sicari, et al., "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015.
[10] M. S. Hossain and G. Muhammad, "Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring," Computer Networks, vol. 101, pp. 192-202, 2016.
[11] A. Mehmood, et al., "Protection of big data privacy," IEEE access, vol. 4, pp. 1821-1834, 2016.
[12] S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data," IEEE access, vol. 4, pp. 2751-2763, 2016.
[13] D. Baker, et al., "Privacy-Preserving Linkage of Genomic and Clinical Data Sets," IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2018.
[14] G. Manogaran, et al., "A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system," Future Generation Computer Systems, vol. 82, pp. 375-387, 2018.
[15] A. Lounis, et al., "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks," Future Generation Computer Systems, vol. 55, pp. 266-277, 2016.
[16] C. Guo, et al., "Fine-grained database field search using attribute-based encryption for e-healthcare clouds," Journal of medical systems, vol. 40, p. 235, 2016.
[17] H. K. Patil and R. Seshadri, "Big data security and privacy issues in healthcare," in Big Data (BigData Congress), 2014 IEEE International Congress on, 2014, pp. 762-765.
[18] A. N. Kho, et al., "Design and implementation of a privacy preserving electronic health record linkage tool in Chicago," Journal of the American Medical Informatics Association, vol. 22, pp. 1072-1080, 2015.
[19] D. Vatsalan, et al., "Privacy-preserving record linkage for big data: Current approaches and research challenges," in Handbook of Big Data Technologies, ed: Springer, 2017, pp. 851-895.
[20] K. Liang, et al., "Privacy-preserving ciphertext multi-sharing control for big data storage," IEEE transactions on information forensics and security, vol. 10, pp. 1578-1589, 2015.