Privacy Preservation in Big Data

International Journal of Computer & Organization Trends  (IJCOT)          
© 2017 by IJCOT Journal
Volume - 7 Issue - 5
Year of Publication : 2017
Authors :  Vijay laxmi Sharma
DOI : 10.14445/22492593/IJCOT-V46P301


Vijay laxmi Sharma "Privacy Preservation in Big Data", International Journal of Computer & organization Trends (IJCOT), V7(5):1-4 Sep - Oct  2017, ISSN:2249-2593, Published by Seventh Sense Research Group.


Big Data: a gigantic volume of both structured and unstructured data that it`s hard to process utilizing customary database and programming methods.. Privacy preservation is one of most concerned issues in Big Data.The Proposed More Efficient and protection saving cosine similitude figuring protocol (PCSF) that can proficiently compute the cosine similitude of two vectors without unveiling the vectors to each other. SHA-3 Hash function” KACCAK” and AES Cryptographic algorithm are used that ensures the Authentication and Integrity while Processing of Data. It provides Privacy Preservation and thus be very useful for privacy-preserving in big data analytics.


[1] Rongxing, Z. Hui, L. Ximeng, J. K. Liu, and S. Jun, "Toward efficient and privacy-preserving computing in big data era," Network, IEEE, vol. 28, no. 4, pp. 46-50, 2013.
[2] K. Sung-Hwan, K. Nam-Uk, and C. Tai-Myoung, "Attribute Relationship Evaluation Methodology for Big Data Security," in International Conference on IT Convergence and Security (ICITCS) 2013, pp. 1-4.
[3] Z.Xuyun, Y.chi,S. Nepal, L.Chang, D.Wanchun, and C. Jinjun, “A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Preservation on Cloud," in Third International Conference on cloud and Green Computing (CGC) 2013, pp. 105-112.
[4] R. . Mahesh and T. Meyyappan, "Anonymization technique through record elimination to preserve privacy of published data," in International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013, pp. 328-332
[5] A. Gholipour , S.Mirzakuchaki, “ High-Speed Implementation of the KECCAK Hash Function on FPGA, ” in International Journal of Advanced Computer Science, Vol. 2, No. 8, Pp. 303-307, Aug., 2012.
[6] Y. Demchenko, P. Grosso, C. de Laat, and P. Membrey “ Addressing big data issues in Scientific Data Infrastructure ," in International Conference on Collaboration Technologies and Systems (CTS) 2013, pp.48-55.
[7] C. Antorweep, W. Tomasz, and R. Chunming, "Privacy Preserving Data Analytics for Smart Homes," in Proceedings of the IEEE Security and privacy workshops: IEEE Computer Society, 2013.
[8] D.B.Nickolas, A. Sivasankar, “ High-Speed Implementation of the KECCAK Hash Function on FPGA, ” in International Journal of Engineering Trends and Technology(IJETT)-Volume4 Issue6- June 2013.
[9] Iraklis Leontiadis, Melek O¨ nen, Refik Molva, M.J. Chorley, G.B Colombo "Privacy preserving similarity detection for data analysis," in Proceedings of the IEEE Security and Privacy Workshops: IEEE Computer Society, 2013.
[10] S. Rajan , W. Ginkal ,N. Suderesan , “Top Ten Big Data security AND Privacy Challenges, “in Cloud Security Aliance,2012,pp. 1-11.
[11] Bilal Hawashin , Farshad Fotouhi, Traian Marius Trut,William Grosky “Efficient Privacy Preserving Protocols for Similarity Join, “ Network,IEEE, 29, no. 9, pp. 55-59, 2013.

Big data, Kaccak ,AES and Cosine similarity.