{"title":"个人隐私保护方法的大数据视角","authors":"Poornima Kulkarni, N. K. Cauvery","doi":"10.1109/ICCCS51487.2021.9776332","DOIUrl":null,"url":null,"abstract":"The evolution of social media has made big data more and more accessible to the public along with the availability of diverse datasets which may lead to the rise of privacy concerns. These datasets may contain Personally Identifiable Information which is meant for a specific purpose can lead to the violation of the user's privacy if misused. The existing data protection mechanisms don't scale up with the characteristics of big data namely Volume, Velocity, Variety, Veracity, and Value and therefore there is a need to redefine privacy-preserving techniques to address the issues related to the characteristics that are associated with big data. In this work, we assess and analyze the capability of traditional privacy-preserving techniques and the relevance of these techniques in the present scenario.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Big Data Perspective of Individual Privacy Protection Approaches\",\"authors\":\"Poornima Kulkarni, N. K. Cauvery\",\"doi\":\"10.1109/ICCCS51487.2021.9776332\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The evolution of social media has made big data more and more accessible to the public along with the availability of diverse datasets which may lead to the rise of privacy concerns. These datasets may contain Personally Identifiable Information which is meant for a specific purpose can lead to the violation of the user's privacy if misused. The existing data protection mechanisms don't scale up with the characteristics of big data namely Volume, Velocity, Variety, Veracity, and Value and therefore there is a need to redefine privacy-preserving techniques to address the issues related to the characteristics that are associated with big data. In this work, we assess and analyze the capability of traditional privacy-preserving techniques and the relevance of these techniques in the present scenario.\",\"PeriodicalId\":120389,\"journal\":{\"name\":\"2021 6th International Conference on Computing, Communication and Security (ICCCS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 6th International Conference on Computing, Communication and Security (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCS51487.2021.9776332\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS51487.2021.9776332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Big Data Perspective of Individual Privacy Protection Approaches
The evolution of social media has made big data more and more accessible to the public along with the availability of diverse datasets which may lead to the rise of privacy concerns. These datasets may contain Personally Identifiable Information which is meant for a specific purpose can lead to the violation of the user's privacy if misused. The existing data protection mechanisms don't scale up with the characteristics of big data namely Volume, Velocity, Variety, Veracity, and Value and therefore there is a need to redefine privacy-preserving techniques to address the issues related to the characteristics that are associated with big data. In this work, we assess and analyze the capability of traditional privacy-preserving techniques and the relevance of these techniques in the present scenario.