CFP last date
20 May 2024
Reseach Article

Big Data - Privacy and Management

by Sanjay Thimmarayappa, Megha V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 6
Year of Publication: 2014
Authors: Sanjay Thimmarayappa, Megha V
10.5120/18754-0012

Sanjay Thimmarayappa, Megha V . Big Data - Privacy and Management. International Journal of Computer Applications. 107, 6 ( December 2014), 13-16. DOI=10.5120/18754-0012

@article{ 10.5120/18754-0012,
author = { Sanjay Thimmarayappa, Megha V },
title = { Big Data - Privacy and Management },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 6 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number6/18754-0012/ },
doi = { 10.5120/18754-0012 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:45.631021+05:30
%A Sanjay Thimmarayappa
%A Megha V
%T Big Data - Privacy and Management
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 6
%P 13-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With big data dimensions increasing exponentially, the privacy and security issues surrounding it also magnify. Therefore, traditional security mechanisms tailored to secure small-scale, static data are insufficient. Along with the security concerns, data management also becomes an important factor to be considered. This paper discusses about big data and the challenges faced by big data with regard to privacy and management while proposing possible alternatives to overcome these challenges.

References
  1. Anagnostopoulos, Aris, Michael T. Goodrich, and Roberto Tamassia. "Persistent authenticated dictionaries and their applications. " Information Security. Springer Berlin Heidelberg, 2001. 379-393.
  2. Bagga, Walid, and Refik Molva. "Collusion-free policy-based encryption. "Information Security. Springer Berlin Heidelberg, 2006. 233-245.
  3. Boneh, Dan, Craig Gentry, and Brent Waters. "Collusion resistant broadcast encryption with short ciphertexts and private keys. " Advances in Cryptology–CRYPTO 2005. Springer Berlin Heidelberg, 2005.
  4. Feng, Jun, Yu Chen, and Pu Liu. "Bridging the missing link of cloud data storage security in AWS. " Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE. IEEE, 2010.
  5. Kallahalla, Mahesh, et al. "Plutus: Scalable Secure File Sharing on Untrusted Storage. " Fast. Vol. 3. 2003.
  6. Majuntke, Matthias, et al. "Abortable fork-linearizable storage. " Principles of Distributed Systems. Springer Berlin Heidelberg, 2009. 255-269.
  7. Onieva, Jose A. , and Jianying Zhou. Secure multi-party non-repudiation protocols and applications. Vol. 43. Springer, 2008.
  8. Popa, Raluca Ada, et al. "Enabling Security in Cloud Storage SLAs with CloudProof. " USENIX Annual Technical Conference. Vol. 242. 2011.
  9. Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing. " INFOCOM, 2010 Proceedings IEEE. Ieee, 2010.
  10. Duhigg, Charles. "How companies learn your secrets. " New York Times 16 (2012).
  11. Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749. " New York Times 9. 2008 (2006): 8For.
  12. Gentry, Craig. "Computing arbitrary functions of encrypted data. "Communications of the ACM 53. 3 (2010): 97-105.
  13. A. Hough. "Google engineer fired for privacy breach after 'stalking and harassing teenagers'". The Telegraph. Sept 15, 2010.
  14. Haeberlen, Andreas, Benjamin C. Pierce, and Arjun Narayan. "Differential Privacy Under Fire. " USENIX Security Symposium. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Big Data Management Privacy.