首页    期刊浏览 2024年11月28日 星期四
登录注册

文章基本信息

  • 标题:Framework to Avoid Similarity Attack in Big Streaming Data
  • 本地全文:下载
  • 作者:Ganesh Dagadu Puri ; D. Haritha
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2018
  • 卷号:8
  • 期号:5
  • 页码:2920-2925
  • DOI:10.11591/ijece.v8i5.pp2920-2925
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can process the data in parallel to reduce the anonymization delay. In this paper the replacement technique is used for avoiding similarity attack. Late validation technique is used to reduce information loss. The application of this method is in medical diagnosis, e-health applications, health data processing at third party
  • 其他摘要:The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can process the data in parallel to reduce the anonymization delay. In this paper the replacement technique is used for avoiding similarity attack. Late validation technique is used to reduce information loss. The application of this method is in medical diagnosis, e-health applications, health data processing at third party
  • 关键词:privacy;distributed;big data;similarity
国家哲学社会科学文献中心版权所有