K. Chaudhary, Sahil Yadav, T. Singh, Dhruv Yaduvanshi, Monika Goyal
{"title":"保障大数据隐私","authors":"K. Chaudhary, Sahil Yadav, T. Singh, Dhruv Yaduvanshi, Monika Goyal","doi":"10.2139/ssrn.3614233","DOIUrl":null,"url":null,"abstract":"Enormous is characterized as a term used for astoundingly enormous enlightening lists that have progressively various and composite structure. Further, additional difficulties like taking care of, analyzing and applying further strategies for isolating outcomes come inseparable. It is the term used to depict the route toward investigating a lot of complex information to part with the game examples or recognize concealed relationships. In any case, there is a conspicuous logical inconsistency between the security and different worries in large information. The principal concern and reason for this paper is on detachment and security worries in enormous information. This paper speaks to on investigation and arrangement of different unknown methods for protection conservation like t-proximity, k-obscurity, l-assorted variety and differential security.","PeriodicalId":301794,"journal":{"name":"Communication & Computational Methods eJournal","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ensuring Privacy in Big Data\",\"authors\":\"K. Chaudhary, Sahil Yadav, T. Singh, Dhruv Yaduvanshi, Monika Goyal\",\"doi\":\"10.2139/ssrn.3614233\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Enormous is characterized as a term used for astoundingly enormous enlightening lists that have progressively various and composite structure. Further, additional difficulties like taking care of, analyzing and applying further strategies for isolating outcomes come inseparable. It is the term used to depict the route toward investigating a lot of complex information to part with the game examples or recognize concealed relationships. In any case, there is a conspicuous logical inconsistency between the security and different worries in large information. The principal concern and reason for this paper is on detachment and security worries in enormous information. This paper speaks to on investigation and arrangement of different unknown methods for protection conservation like t-proximity, k-obscurity, l-assorted variety and differential security.\",\"PeriodicalId\":301794,\"journal\":{\"name\":\"Communication & Computational Methods eJournal\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Communication & Computational Methods eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3614233\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Communication & Computational Methods eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3614233","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enormous is characterized as a term used for astoundingly enormous enlightening lists that have progressively various and composite structure. Further, additional difficulties like taking care of, analyzing and applying further strategies for isolating outcomes come inseparable. It is the term used to depict the route toward investigating a lot of complex information to part with the game examples or recognize concealed relationships. In any case, there is a conspicuous logical inconsistency between the security and different worries in large information. The principal concern and reason for this paper is on detachment and security worries in enormous information. This paper speaks to on investigation and arrangement of different unknown methods for protection conservation like t-proximity, k-obscurity, l-assorted variety and differential security.