A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms
Johny Antony P1 , Antony Selvadoss Thanamani2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 131-140, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.131140
Online published on Nov 30, 2018
Copyright © Johny Antony P, Antony Selvadoss Thanamani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Johny Antony P, Antony Selvadoss Thanamani, “A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.131-140, 2018.
MLA Style Citation: Johny Antony P, Antony Selvadoss Thanamani "A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms." International Journal of Computer Sciences and Engineering 6.11 (2018): 131-140.
APA Style Citation: Johny Antony P, Antony Selvadoss Thanamani, (2018). A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms. International Journal of Computer Sciences and Engineering, 6(11), 131-140.
BibTex Style Citation:
@article{P_2018,
author = {Johny Antony P, Antony Selvadoss Thanamani},
title = {A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {131-140},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3134},
doi = {https://doi.org/10.26438/ijcse/v6i11.131140}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.131140}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3134
TI - A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - Johny Antony P, Antony Selvadoss Thanamani
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 131-140
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
629 | 497 downloads | 309 downloads |
Abstract
Privacy preservation in big data is a need of the time because of the specialties of the data. Many researches have been made to tackle the issues of privacy in big data still some conflicts arises. Hence, an efficient method for the privacy preservation of data should be introduced. In this proposed work, a novel framework is designed for conserving the data in a secure manner. The personal and medical datasets are taken and are being merged which is under the control of hospital admin. This dataset is preprocessed to remove the noise following the normalization technique in order to convert the string into integers. Then, the efficient partial least square regression model is applied for the extraction of features such as sensitive and non-sensitive attributes. After the identification of this sensitive and non-sensitive attributes, ε-differential privacy preservation algorithm, the sensitive data are encrypted with the use of novel identity based encryption technique by generating the key. By the use of this code the user can decrypt the data which is anonymous format. The performance analysis is made on comparing the existing techniques which shows that the proposed methodology provides a better efficiency in terms of encryption cost, key generation cost, overall execution cost, security scheme, and computation complexity.
Key-Words / Index Term
Privacy preservation, Sensitive attributes, Non-sensitive attributes, ε-differential privacy preservation, encryption, Identity based encryption
References
[1] S. Ananthi and A. Periwal, "Data Security Based On Big Data Storage," Global Journal of Pure and Applied Mathematics, vol. 12, pp. 1491-1500, 2016.
[2] K. He, et al., "On the security of two identity-based conditional proxy re-encryption schemes," Theoretical Computer Science, vol. 652, pp. 18-27, 2016.
[3] S. Wang, et al., "Attribute-based data sharing scheme revisited in cloud computing," IEEE transactions on information forensics and security, vol. 11, pp. 1661-1673, 2016.
[4] A. Azaria, et al., "Medrec: Using blockchain for medical data access and permission management," in Open and Big Data (OBD), International Conference on, 2016, pp. 25-30.
[5] J. Luo, et al., "Big data application in biomedical research and health care: a literature review," Biomedical informatics insights, vol. 8, p. BII. S31559, 2016.
[6] I. A. T. Hashem, et al., "The rise of “big data” on cloud computing: Review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015.
[7] R. Kune, et al., "The anatomy of big data computing," Software: Practice and Experience, vol. 46, pp. 79-105, 2016.
[8] X. Wu, et al., "Data mining with big data," IEEE transactions on knowledge and data engineering, vol. 26, pp. 97-107, 2014.
[9] S. Sicari, et al., "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015.
[10] M. S. Hossain and G. Muhammad, "Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring," Computer Networks, vol. 101, pp. 192-202, 2016.
[11] A. Mehmood, et al., "Protection of big data privacy," IEEE access, vol. 4, pp. 1821-1834, 2016.
[12] S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data," IEEE access, vol. 4, pp. 2751-2763, 2016.
[13] D. Baker, et al., "Privacy-Preserving Linkage of Genomic and Clinical Data Sets," IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2018.
[14] G. Manogaran, et al., "A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system," Future Generation Computer Systems, vol. 82, pp. 375-387, 2018.
[15] A. Lounis, et al., "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks," Future Generation Computer Systems, vol. 55, pp. 266-277, 2016.
[16] C. Guo, et al., "Fine-grained database field search using attribute-based encryption for e-healthcare clouds," Journal of medical systems, vol. 40, p. 235, 2016.
[17] H. K. Patil and R. Seshadri, "Big data security and privacy issues in healthcare," in Big Data (BigData Congress), 2014 IEEE International Congress on, 2014, pp. 762-765.
[18] A. N. Kho, et al., "Design and implementation of a privacy preserving electronic health record linkage tool in Chicago," Journal of the American Medical Informatics Association, vol. 22, pp. 1072-1080, 2015.
[19] D. Vatsalan, et al., "Privacy-preserving record linkage for big data: Current approaches and research challenges," in Handbook of Big Data Technologies, ed: Springer, 2017, pp. 851-895.
[20] K. Liang, et al., "Privacy-preserving ciphertext multi-sharing control for big data storage," IEEE transactions on information forensics and security, vol. 10, pp. 1578-1589, 2015.