Abstract
With the rapid development and wide application of big data technology, a huge amount of data is gathered into big data platform, not only from a wide variety, but also with rapid growth speed. While improving social economic and making social benefits, big data technology is facing great risks and challenges in the aspect of big data security and privacy. Currently, big data privacy has become an urgent problem in the era of big data application which attracts a large number of reports and concerns, and its importance and urgency can’t be ignored. This paper first describes the characteristics and categories of big data privacy, then analysis privacy risks during the whole life cycle of big data processing in deep, including data collection, data integration and fusion, data analysis and data sharing, etc. Finally, this paper discusses the goals and solutions on how to control and prevent big data privacy risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Weitzner, D.J., Bruce, E.J.: Big data privacy workshop: advancing the state of the art in technology and practice. http://web.mit.edu/bigdata-pri/index.html. 3 Mar 2014
Holdren, J.P., Lander, E.S.: Big data privacy: a technological perspective [R/OL]. http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_privacy_-_may_2014.pdf. 1 May 2014
Xiaofeng, M., Xiang, C.: Big data management: concepts, techniques and challenges. J. Comput. Res. Dev. 50(1), 146–169 (2013)
Alina, E., Sungjin, I., Moseley, B.: Fast clustering using MapReduce. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2011), pp. 681–689. ACM, New York (2011)
Caetano, T.J., Traina, A.J.M., Lopez, J., et al.: Clustering very large multi-dimensional datasets with MapReduce. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2011), pp. 690–698. ACM, New York (2011)
Chierichetti, F., Dalvi, N., Kumar, R.: Correlation clustering in MapReduce. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2014), pp. 641–650. ACM, New York (2014)
Hsieh, C.J., Chang, K.W., Lin, C.J., et al. A dual coordinate descent method for large-scale linear SVM. In: Proceedings of the 25th International Conference on Machine Learning (ICML 2008), pp. 408–415. AAAI, Menlo Park, CA (2008)
Schmidt, M., Roux, N.L., Bach, F.: Convergence rates of inexact proximal-gradient methods for convex optimization. In: Processing Systems (NIPS 2011), pp. 1458–1466. Springer, Berlin (2011)
Quick, D., Choo, K.-K.R.: Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data. In: Software: Practice and Experience (2017). doi:10.1002/spe.2429
Quick, D., Choo, K.-K.R.: Digital forensic intelligence: data subsets and open source intelligence (DFINTÂ +Â OSINT): a timely and cohesive mix. In: Future Generation Computer Systems (2017). doi:10.1016/j.future.2016.12.032
Quick, D., Choo, K.-K.R.: Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Netw. Comput. Appl. 86, 24–33 (2017)
Quick, D., Choo, K.-K.R.: Big forensic data reduction: digital forensic images and electronic evidence. Clust. Comput. 19(2), 723–740 (2016)
Quick, D., Choo, K.-K.R.: Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review, and archive. Trends Issues Crime Crim. Justice 480, 1–11 (2014)
Quick, D., Choo, K.-K.R.: Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digit. Investig. 11(4), 273–294 (2014)
Acknowledgements
The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. Our research was sponsored by following projects: the National Natural Science Foundation of China (61403084, 61402116); Program of Science and Technology-Commission of Shanghai Municipality (Nos. 15530701300, 15XD15202000); 2012 IoT Program of Ministry of Industry and Information Technology of China; Key Project of the Ministry of Public Security (No. 2014JSYJA007); the Project of the Key Laboratory of Embedded System and Service Computing, Ministry of Education, Tongji University (ESSCKF 2015-03); Shanghai Rising-Star Program (17QB1401000).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Wang, K. (2018). A Survey on Risks of Big Data Privacy. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-67071-3_23
Published:
Publisher Name: Edizioni della Normale, Cham
Print ISBN: 978-3-319-67070-6
Online ISBN: 978-3-319-67071-3
eBook Packages: EngineeringEngineering (R0)