Sensitivity-based anonymization of big data

Mohammed Al-Zobbi, Seyed Shahrestani, Chun Ruan

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

12 Citations (Scopus)

Abstract

![CDATA[Data Analytics is widely used as a means of extracting useful information from available data. It is only natural that it is increasingly adapted for processing big data. The rapidly growing demand for big data analytics has several undesirable side-effects. Perhaps, the most significant of those relates to increased risks for data disclosure and privacy violations. Data anonymization can provide promising solutions for minimizing such risks. In this paper, we discuss some of the specific requirements of the anonymization process when dealing with big data. We show that in general, information loss is the result of avoidable generalization of similar or equivalent data. Using these analyses, we propose a novel framework for data anonymization, which expands the k-anonymity properties and concepts and takes the data class values and the sensitivity of data into account. As such, the proposed process can utilize a bottomup approach, in contrast to most other anonymization methods. The top-down approaches usually generalize all records, the equivalent and the non-equivalent ones. Ours is more methodical, as it avoids the generalization of the equivalent records. With the inclusion of sensitivity levels, we demonstrate that our framework can reduce the iteration steps and the time required to finalize the anonymization, and therefore enhance the overall efficiency of the process]]
Original languageEnglish
Title of host publicationProceedings of the 2016 IEEE 41st Conference on Local Computer Networks: LCN Workshops 2016, 7-10 November 2016, Dubai, United Arab Emirates
PublisherIEEE
Pages58-64
Number of pages7
ISBN (Print)9781509023479
DOIs
Publication statusPublished - 2016
EventConference on Local Computer Networks -
Duration: 7 Nov 2016 → …

Conference

ConferenceConference on Local Computer Networks
Period7/11/16 → …

Keywords

  • access control
  • big data
  • computer networks
  • computer security

Fingerprint

Dive into the research topics of 'Sensitivity-based anonymization of big data'. Together they form a unique fingerprint.

Cite this