References
- Sagiroglu, S., & Sinanc, D. (2013, May). Big data: A review. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 42-47). IEEE.
- Jain, P., Gyanchandani, M., Khare, N., Singh, D. P., & Rajesh, L. (2017). A Survey on big data privacy using hadoop architecture. International Journal of Computer Science and Network Security (IJCSNS), 17(2), 148.
- Tene, O., & Polonetsky, J. (2012). Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop., 11, xxvii.
- Smith, M., Szongott, C., Henne, B., & Von Voigt, G. (2012, June). Big data privacy issues in public social media. In 2012 6th IEEE international conference on digital ecosystems and technologies (DEST) (pp. 1-6). IEEE.
- Dong, C., Chen, L., & Wen, Z. (2013, November). When private set intersection meets big data: an efficient and scalable protocol. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 789-800).
- Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In 2014 IEEE international congress on big data (pp. 762-765). IEEE.
- Liu, W., Uluagac, A. S., & Beyah, R. (2014, April). MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 518-523). IEEE.
- Fang, W., Wen, X. Z., Zheng, Y., & Zhou, M. (2017). A survey of big data security and privacy preserving. IETE Technical Review, 34(5), 544-560. https://doi.org/10.1080/02564602.2016.1215269
- Bertino, E., Ferrari, E., & Pitoura, E. (2001, April). An access control mechanism for large scale data dissemination systems. In Proceedings Eleventh International Workshop on Research Issues in Data Engineering. Document Management for Data Intensive Business and Scientific Applications. RIDE 2001 (pp. 43-50). IEEE.
- Chen, X., & Huang, Q. (2013, May). The data protection of MapReduce using homomorphic encryption. In 2013 IEEE 4th International Conference on Software Engineering and Service Science (pp. 419-421). IEEE.
- Raghuwanshi, D. S., & Rajagopalan, M. R. (2014, January). MS2: Practical data privacy and security framework for data at rest in cloud. In 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (pp. 1-8). IEEE.
- Son, J., Kim, D., Hussain, R., & Oh, H. (2014, April). Conditional proxy re-encryption for secure big data group sharing in cloud environment. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 541-546). IEEE.
- Chakravorty, A., Wlodarczyk, T., & Rong, C. (2013, May). Privacy preserving data analytics for smart homes. In 2013 IEEE Security and Privacy Workshops (pp. 23-27). IEEE.
- Dev, H., Sen, T., Basak, M., & Ali, M. E. (2012, November). An approach to protect the privacy of cloud data from data mining based attacks. In 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (pp. 1106-1115). IEEE.
- Ukil, A., Bandyopadhyay, S., Joseph, J., Banahatti, V., & Lodha, S. (2012, August). Negotiation-based privacy preservation scheme in internet of things platform. In Proceedings of the First International Conference on Security of Internet of Things (pp. 75-84).
- Huang, X., & Du, X. (2014, April). Achieving big data privacy via hybrid cloud. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 512-517). IEEE.
- Kumar, A., Lee, H., & Singh, R. P. (2012, October). Efficient and secure Cloud storage for handling big data. In 2012 6th International Conference on New Trends in Information Science, Service Science and Data Mining (ISSDM2012) (pp. 162-166). IEEE.
- Leontiadis, I., Onen, M., Molva, R., Chorley, M. J., & Colombo, G. B. (2013, September). Privacy preserving similarity detection for data analysis. In 2013 International Conference on Cloud and Green Computing (pp. 547-552). IEEE.
- Liu, D., & Wang, S. (2012, October). Query encrypted databases practically. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 1049-1051).
- Dinh, T. T. A., & Datta, A. (2012). Stream on the sky: Outsourcing access control enforcement for stream data to the cloud. arXiv preprint arXiv:1210.0660.
- Zhang, X., Liu, C., Nepal, S., Dou, W., & Chen, J. (2012, November). Privacy-preserving layer over MapReduce on cloud. In 2012 Second International Conference on Cloud and Green Computing (pp. 304-310). IEEE.