Open Access   Article Go Back

Privacy preservation and Privacy by Design techniques in Big Data

M. Suresh Babu1 , Mohammed Irfan2 , Suneetha. V3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 588-593, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.588593

Online published on Apr 30, 2019

Copyright © M. Suresh Babu, Mohammed Irfan, Suneetha. V . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Suresh Babu, Mohammed Irfan, Suneetha. V, “Privacy preservation and Privacy by Design techniques in Big Data,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.588-593, 2019.

MLA Style Citation: M. Suresh Babu, Mohammed Irfan, Suneetha. V "Privacy preservation and Privacy by Design techniques in Big Data." International Journal of Computer Sciences and Engineering 7.4 (2019): 588-593.

APA Style Citation: M. Suresh Babu, Mohammed Irfan, Suneetha. V, (2019). Privacy preservation and Privacy by Design techniques in Big Data. International Journal of Computer Sciences and Engineering, 7(4), 588-593.

BibTex Style Citation:
@article{Babu_2019,
author = {M. Suresh Babu, Mohammed Irfan, Suneetha. V},
title = {Privacy preservation and Privacy by Design techniques in Big Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {588-593},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4081},
doi = {https://doi.org/10.26438/ijcse/v7i4.588593}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.588593}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4081
TI - Privacy preservation and Privacy by Design techniques in Big Data
T2 - International Journal of Computer Sciences and Engineering
AU - M. Suresh Babu, Mohammed Irfan, Suneetha. V
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 588-593
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
1007 250 downloads 171 downloads
  
  
           

Abstract

Big Data is a common term referring to a data revolution in information technology that makes it easy to collect, store and analyze user data online at relatively low costs. In simpler words, any human activity using technology leaves a ‘digital exhaust’ or a trace data, a footprint. Broadly speaking, the big pool of all these collected footprints is called Big Data. However, it’s not just a collection of these footprints but it also contains various other information like weather, train information, payments, etc. Generally these footprints may not have any apparent or obvious meaning, but they start to make sense when combined with other recorded datasets. This information could be processed using powerful analytic tools to give greater meaning and context to it while also enabling the system to ‘predict’ the unknown or missing information in the dataset. Today, we are already surrounded by a sea of ubiquitous sensors (sensors on your phones, punching access cards or swiping credit cards, etc). With each advancement, like the advent of the Internet of Things, coupled with the ‘smartphone revolution’ linking more and more information to your social media accounts, it is getting easier to gather more information and make sense of it. In this paper we discussed pseudonymization and privacy by design as the processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information.

Key-Words / Index Term

Ubiquitous, Pseudonymization, privacy by design

References

[1]. Lee Chung, H.; Cranage David, A. 2010. Personalisation-privacy paradox: The effects of personalisation and privacy assurance on customer responses to travel websites. Elsevier. http://www.elsevier.com/locate/tourman
[2]. Yanying Gu, Anthony Lo, 2009. A Survey of Indoor Positioning Systems for Wireless Personal Networks. IEEE Communications Surveys & Tutorials, Vol. 11, №1, First Quarter.
[3]. Manyika, J., et. al. (2011). Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute. Online: http://www.mckinsey.com/Insights/MGI/Research/Technology_andInnovation/Big_data_The_next_frontier_for_innovation.
[4]. Tene, O., and Polonetsky J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review 64, 63.
[5]. Commission Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), COM (2012) 11 final (Jan. 25, 2012). Online: http://ec.europa.eu/justice/ newsroom/data-protection/news/120125_en.htm.
[6]. Gantz. J., and Reinsel. D. (2011). Extracting value from chaos. IDC. Online: http://www.emc.com/ collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf
[7]. Jeff Jonas and Lisa Sokol (2009), “Data finds data,” in Segaran, T., and Hammerbacher, J. (eds.), Beautiful Data The Stories Behind Elegant Data Solutions, O’Reilly Media. p. 105.
[8]. Jonas, J. (Oct 11, 2010). On how data makes corporations dumb. GigaOm. Online: http://gigaom. com/2010/10/11/jeff-jonas-big-data/.
[9]. Marsella, A., and Banks, M. (2005). Making customer analytics work for you! Journal of Targeting, Measurement and Analysis for Marketing. 13(4), 299-303.
[10]. Jonas, J., and Harper, J. (2006). Effective counterterrorism and the limited role of predictive data mining. Policy Analysis. CATO Institute, Washington, DC, 584, 1-11. 13 Jonas, J. (2009). Data finds data. Online:http://jeffjonas.typepad.com/jeff_jonas/2009/07/data-findsdata.html
[11]. Privacy and Security by design is a crucial step for privacy protection., Least Authority Kingsmill, S. & Cavoukian, A. Privacy by Design: Setting a new standard for privacy certification
[12]. Maple, C., Security and privacy in the internet of things, Taylor and Francis Online