Professional Documents
Culture Documents
Data Publisher
[1] “Protection of Big Data Applying the described -presented an existing privacy preserving
Privacy”. Mehmood. A., techniques, privacy is mechanisms in the various stages of life
Natgunanathan, I., Xiang, protected but the data may cycle of big data like data generation, data
Y., Hua, G., & Guo, S. lose the meaning in the real storage and data processing.
(2016). world and also the utility and
significance. Therefore the -presented various challenges of
techniques need to be preserving privacy in big data.
modified or extended to
handle the privacy and -Various risks involved in the
security of big data in an anonymization, encryption and storage of
efficient manner. data in the cloud are also investigated.
Continue…
Paper and Author name Observation Remarks
[2] “A Framework for More ways are to be explored -Rampart framework for privacy
Categorizing and Applying to protect privacy against preservation
Privacy-Preservation various threats. -Consists of seven procedures as
Techniques in Big Data anonymization, reconstruction,
Mining”. Xu, L., Jiang, C., modification, provenance, agreement,
Chen,Y., Wang, J., & Ren, trade and restriction to prevent outside
Y. (2016). intrusion.
- This framework tries to give high
priority to maintain the balance between
data utility and privacy.
Continue…
Paper and Author name Observation Remarks
[3] “Preserving Privacy in Limitations such as data -Privacy preserving problem of big data
MapReduce Based Clouds: distortion and no one of them in the context of hybrid cloud computing
Insight into Frameworks is fully fit for privacy is investigated.
and Approaches”. Al- preservation. -Presented frameworks such as Airavat,
Aqeeli, S., & Alnifie, G. Sedic, Sac-FRAPP and Hyper-1 based on
(2015). Mapreduce.
-Anonymization, encryption and
differential privacy are the efficient
methods for protecting privacy of data is
recorded here.
Continue…
Paper and Author name Observation Remarks
[4] “Overlapping Slicing This solution overcame with -A new privacy model with overlapping
with New Privacy Model”. the limitations of slicing and slicing which duplicates attribute in more
Giri S. Suman., & anonymization but while than one column is presented.
Mukhopdhay Milav. reducing attribute disclosure -This model increases privacy and utility
(2014). risk increase the chance for of data by achieving correlation among
identity disclosure risk. attributes.
- It can also handle high dimensional data.
Continue..
Paper and Author name Observation Remarks
[6] “A Traitor Identification The system performs blind -Traitor identification system embeds
Technique for Numeric decoding and it is considered fingerprint securely for providing
Relational Databases with as robust against attacks such protection to numeric relational
Distortion Minimization as tuple insertion and databases.
and Collusion Avoidance”. deletion, attribute deletion -Insertion technique reduces time
Arti Mohanpurkar, etc. complexity as well as ensures that
Madhuri Joshi,.(2016) inserted fingerprint in the form of an
error bits leads to minimum distortion.
Existing System
Privacy preserving with the help of Cryptography
algorithm.
The system work with traditional approach for distributed
system.
In Cryptography algorithm the security is provided with the
help of key.
Data leakage issue when apply Multi Party Computation
(SMC) protocol.
No provision for copyright protection.
Key generation and key management is the time consuming
process.
Data loss occurs in this system because of key
management.
Disadvantages of Existing System
Data leakage as well as data lineage issue.
System can work only on structured dataset.
Time complexity is very high.
No database security has defined.
No provision defined for copyright protection and traitor
identification.
Problem Statement
To design and implement a system that can provide
privacy and security to overall system in HDFS
environment. With the data privacy system prevents
the data from various attacks for sensitive
information breaches and with the security system
provides copyright protection along with traitor
identification (if any).
Proposed System
In future this system can be considered for data which are