Universiti Teknologi Malaysia Institutional Repository

Privacy prevention of big data applications: a systematic literature review

Rafiq, Fatima and Awan, Mazhar Javed and Yasin, Awais and Nobanee, Haitham and Mohd. Zain, Azlan and Bahaj, Saeed Ali (2022) Privacy prevention of big data applications: a systematic literature review. SAGE Open, 12 (2). pp. 1-23. ISSN 2158-2440

[img] PDF
802kB

Official URL: http://dx.doi.org/10.1177/21582440221096445

Abstract

This paper focuses on privacy and security concerns in Big Data. This paper also covers the encryption techniques by taking existing methods such as differential privacy, k-anonymity, T-closeness, and L-diversity. Several privacy-preserving techniques have been created to safeguard privacy at various phases of a large data life cycle. The purpose of this work is to offer a comprehensive analysis of the privacy preservation techniques in Big Data, as well as to explain the problems for existing systems. The advanced repository search option was utilized for the search of the following keywords in the search: “Cyber security” OR “Cybercrime”) AND ((“privacy prevention”) OR (“Big Data applications”)). During Internet research, many search engines and digital libraries were utilized to obtain information. The obtained findings were carefully gathered out of which 103 papers from 2,099 were found to gain the best information sources to address the provided study subjects. Hence a systemic review of 32 papers from 103 found in major databases (IEEExplore, SAGE, Science Direct, Springer, and MDPIs) were carried out, showing that the majority of them focus on the privacy prediction of Big Data applications with a contents-based approach and the hybrid, which address the major security challenge and violation of Big Data. We end with a few recommendations for improving the efficiency of Big Data projects and provide secure possible techniques and proposed solutions and model that minimizes privacy violations, showing four different types of data protection violations and the involvement of different entities in reducing their impacts.

Item Type:Article
Uncontrolled Keywords:anonymity, artificial intelligence, Big Data, cyber security, cybercrime, data protection, Internet of Things, prevention, privacy, public policy, security, sustainability
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:103942
Deposited By: Yanti Mohd Shah
Deposited On:07 Dec 2023 08:30
Last Modified:07 Dec 2023 08:30

Repository Staff Only: item control page