Browse > Article
http://dx.doi.org/10.15207/JKCS.2018.9.10.055

Private information protection method and countermeasures in Big-data environment: Survey  

Hong, Sunghyuck (Div. of Information & Communication, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.9, no.10, 2018 , pp. 55-59 More about this Journal
Abstract
Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.
Keywords
Privacy protection; Big-data analysis; 4th industrial revolution; Big Data Security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 W. Fan & A. Bifet. (2013). Mining Big-data. ACM SIGKDD Explorations Newsletter, 14(2), 1.   DOI
2 N. Khan, I. Yaqoob, I. Hashem, Z. Inayat, A. W. Mahmoud, M. Alam, M. Shiraz & A. Gani. (2014). Big-data: Survey, Technologies, Opportunities, and Challenges. The Scientific World Journal, 1-18.
3 S. Hong. (2017). Secure and light IoT protocol (SLIP) for anti-hacking. Journal of Computer Virology and Hacking Techniques, 13(4), 241-247. doi:10.1007/s11416-017-0295-5.   DOI
4 P. Tallon. (2013). Corporate Governance of Big-data: Perspectives on Value, Risk, and Cost. Computer, 46(6), 32-38.   DOI
5 H. Varian. (2014). Beyond Big-data. Bus Econ, 49(1), 27-31.   DOI
6 S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. doi:10.15207/jkcs.2017.8.2.021   DOI
7 S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. doi:10.14400/jdpm.2014.12.1.423   DOI
8 S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. doi:10.14400/jdpm.2013.11.12.453   DOI
9 S. Hong, S. Lim & J. Song. (2011). Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey. KSII Transactions on Internet and Information Systems, 805-821. doi:10.3837/tiis.2011.04.010   DOI
10 S. Hong. (2015). Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques, 12(3), 137-143. doi:10.1007/s11416-015-0254-y   DOI
11 R. Smolan & J. Erwitt. (2012). The human face of Big-data. Sausalito, Calif: Against All Odds Productions.
12 S. U. Cha. (2014). Big-data Protection of the environment and privacy. IT and Law Studies, 8, 193-259.
13 H. M. Choi. (2014). [Encouragement Prize] A study on the inconsistency problem of the Big-data era and current privacy laws and their solutions. IT and Legal Research, 8, 357-382.
14 S. W. Heo. (2014). Big-data Legal Issues in Korea. Journal of Law & Economic Ragulation, 7(2), 7-21.
15 K. J. Park. (2012). Big-data Eco System. Industrial Engineering Magazine, 19(3), 41-47.