CFP last date
20 June 2024
Reseach Article

A Survey on Two-Phase Top-Down Specialization For Data Anonymization Using Map Reduce On Cloud

Published on December 2014 by Monali S.bachhav, Amitkumar Manekar
Innovations and Trends in Computer and Communication Engineering
Foundation of Computer Science USA
ITCCE - Number 4
December 2014
Authors: Monali S.bachhav, Amitkumar Manekar
ecf4ec63-f4c8-4a8b-ab5b-2f78ae4bf064

Monali S.bachhav, Amitkumar Manekar . A Survey on Two-Phase Top-Down Specialization For Data Anonymization Using Map Reduce On Cloud. Innovations and Trends in Computer and Communication Engineering. ITCCE, 4 (December 2014), 8-11.

@article{
author = { Monali S.bachhav, Amitkumar Manekar },
title = { A Survey on Two-Phase Top-Down Specialization For Data Anonymization Using Map Reduce On Cloud },
journal = { Innovations and Trends in Computer and Communication Engineering },
issue_date = { December 2014 },
volume = { ITCCE },
number = { 4 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 8-11 },
numpages = 4,
url = { /proceedings/itcce/number4/19060-2026/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Innovations and Trends in Computer and Communication Engineering
%A Monali S.bachhav
%A Amitkumar Manekar
%T A Survey on Two-Phase Top-Down Specialization For Data Anonymization Using Map Reduce On Cloud
%J Innovations and Trends in Computer and Communication Engineering
%@ 0975-8887
%V ITCCE
%N 4
%P 8-11
%D 2014
%I International Journal of Computer Applications
Abstract

Most cloud services require users to share personal data like electronic health records for analysis of data or mining, bringing privacy concerns. In many cloud applications at present the scale of data increases in accordance with Big Data, thereby making it a complicated to commonly used software tools to handle and process a large-scale data within a tolerable elapsed time. It is challenging for previous annonymization approaches to achieve privacy preservation on large scale data sets due to insufficiency. The proposed a scalable two-phase top-down specialization (TDS) approach uses MapReduce architecture on cloud to annonymized large scale datasets finally deliberately design a group of innovative MapReduce jobs to particularly accomplish specialization computation in a highly scalable way. So the ability of TDS and efficiency of TDS can be significantly improved over existing approaches.

References
  1. Xuyun Zhang, Laurence T. Yang, Chang Liu, Jinjun Chen,"A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud," IEEE Trans. Parallel and Distributed Systems, vol. 25, No. 2, Feb 2014.
  2. OpenStack, http://openstack. org/, 2013.
  3. S. Chaudhari,"What Next?: A Half-Dozen Data Management Research Goals for Big Data and the Cloud," Proc. 31st Symp. Principles of Database Systems (PODS '12), pp. 1-4, 2012.
  4. P. Mohan, A. Thakurta, E. Shi, D. Song, and D. Culler, "Gupt: Privacy Preserving Data Analysis Made Easy," Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '12), pp. 349-360, 2012.
  5. L. Hsiao-Ying and W. G. Tzeng, "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp. 995-1003, 2012.
  6. N. Mohammed, B. C. Fung, and M. Debbabi, "Anonymity Meets Game Theory: Secure Data Integration with Malicious Partici-pants," VLDB J. , vol. 20, no. 4, pp. 567-588, 2011.
  7. J. Ekanayake, H. Li, B. Zhang, T. Gunarathne, S. -H. Bae, J. Qiu, and G. Fox, "Twister: A Runtime for Iterative Mapreduce," Proc. 19th ACM Int'l Symp. High Performance Distributed Computing (HDPC '10), pp. 810-818, 2010.
  8. N. Mohammed, B. Fung, P. C. K. Hung, and C. K. Lee,"Centralized and Distributed Anonymization for High-Dimensional Healthcare Data," ACM Trans. Knowledge Discovery from Data, vol. 4, no. 4, Article 18, 2010.
  9. B. Fung, K. Wang, L. Wang, and P. C. K. Hung, "Privacy-Preserving Data Publishing for Cluster Analysis," Data and Knowledge Eng. , vol. 68, no. 6, pp. 552-575, 2009.
  10. B. C. M. Fung, K. Wang, and P. S. Yu, "Anonymizing Classification Data for Privacy Preservation," IEEE Trans. Knowledge and Data Eng. , vol. 19, no. 5, pp. 711-725, May 2007.
  11. L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
  12. KVM, http://www. linux-kvm. org/page/Main_page, 2013.
  13. UCI Machine Learning Repository, ftp://ftp. ics. uci. edu/pub/machine-learnng-databases/,
  14. Apache, "Hadoop,"http://hadoop. apache. org , 2013.
  15. Amazon Web Services, "Amazon Elastic MapReduce," http://aws. amazon. com/elasticmapreduce/, 2013.
  16. L. Sweeney, "k-Anonymity: A Model for Protecting Privacy,"int'l J. Uncertainty, Fuzziness and Knowledge-Based System, vol. 10,no. 5, pp. 557-570, 2002.
  17. Y. Bu, B. Howe, M. Balazinska, and M. Ernst, "The Hadoop Approach to Large-Scale Iterative Data nalysis," VLDB J. , vol. 21, no. 2,pp. 169-190, 2012.
  18. W. Jiang and C. Clifton, " A Secure Distributed Framework for Achieving k-Anonymity," VLDB J. , vol. 15, no. 4, pp. 316-333, 2006.
  19. V. Borkar, M. J. Carey, and C. Li, "Inside 'Big Data Database Technology (EDBT '12), pp. 3-14, 2012. Management': Ogres, Onions, or Parfaits?," Proc. 15th Int'l Conf. Extending Database Techonology (EDBT '12), pp. 3-14, 2012.
  20. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional K-Anonymity," Proc. 22nd Int'l Conf. Data Eng. (ICDE '06), 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Data Anonymization Top-down Specialization Mapreduce Cloud Privacy Preservation