Encrypting security for virtualized environments in big data storage with generalized anonymization strategies
Keywords:
Anonymization, Generalisation, Big Data, Data Encryption, Privacy Protection, Information SharingAbstract
Big data security has grown in importance as a result of its strong correlation to users. Because big data contains individually identifying information, it poses a considerable safety issue. To protect personal information, data confidentiality is commonly employed in non-interactive information sharing and transmission settings. This entails hiding identifiable and confidential material from the owners of acquired data.Anonymization is a computational technology that eliminates or alters personal identifying details, resulting in anonymous data which cannot be linked to every single citizen. The anonymization method enables the release of knowledge, allowing for study and assurance. Privacy protection protects sensitive data from a range of threats. Utilizing data encryption and data anonymization is indeed the method of making modifications to the information to be utilised or used in a method which will avoid pertinent data from being identified. Several organisations make data available anonymously to the general public. Employing data anonymization, important bits of private information are masked in order to protect private information.Anonymous data may be stored and accessed in the cloud without fear of being intercepted by others. Anonymization protects against data abuse and insider exploit hazards that lead to regulatory compliance loss.
Downloads
References
A. Kumar, B. G. Lee, H. Lee and A. Kumari, "Secure storage and access of data in cloud computing," 2012 International Conference on ICT Convergence (ICTC), 2012, pp. 336-339, doi: 10.1109/ICTC.2012.6386854.
Approach in Detecting and Isolation of Malicious Nodes in MANET” Wireless Personal Communication, 119, pages21–35 (2021) Springer Jan 2021
Cong Wang, Qian Wang, Kui Ren and Wenjing Lou, "Ensuring data storage security in Cloud Computing," 2009 17th International Workshop on Quality of Service, 2009, pp. 1-9, doi: 10.1109/IWQoS.2009.5201385.
Inukollu, Venkata &Arsi, Sailaja &Ravuri, Srinivasa. (2014). Security Issues Associated with Big Data in Cloud Computing. International Journal of Network Security & Its Applications. 6. 45-56. 10.5121/ijnsa.2014.6304.
Jain, P., Gyanchandani, M. &Khare, N. Big data privacy: a technological perspective and review. J Big Data 3, 25 (2016). https://doi.org/10.1186/s40537-016-0059-y
Karle, Tanashri& Vora, Deepali. (2017). PRIVACY preservation in big data using anonymization techniques. 340-343. 10.1109/ICDMAI.2017.8073538.
N. L. Kodumru and M. Supriya, "Secure Data Storage in Cloud Using Cryptographic Algorithms," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018, pp. 1-6, doi: 10.1109/ICCUBEA.2018.8697550.
Preethi, P., & Asokan, R. (2019). An attempt to design improved and fool proof safe distribution of personal healthcare records for cloud computing. Mobile Networks and Applications, 24(6), 1755-1762.
Preethi, P., & Asokan, R. (2021). Modelling LSUTE: PKE Schemes for Safeguarding Electronic Healthcare Records Over Cloud Communication Environment. Wireless Personal Communications, 117(4), 2695-2711.
Pronika and S. S. Tyagi, "Secure Data Storage in Cloud using Encryption Algorithm," 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 136-141, doi: 10.1109/ICICV50876.2021.9388388.
R. R. Bobde, A. Khaparde and M. M. Raghuwanshi, "An approach for securing data on Cloud using data slicing and cryptography," 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 2015, pp. 1-5, doi: 10.1109/ISCO.2015.7282356.
R.Thiagarajan, V.BalajiVijayan, Dr.S.Arun, I.Mohan Novel Technique for Automation Billing in Smart Shopping”, International Journal of Scientific & Technology Research, Vol. 9 no.4, March 2020, PP:5363-5369
R.Thiagarajan, Ganesan, Anbarasu, Baskar, Arthi, Rajkumar, Optimised with Secure
R.Thiagarajan,N.R .Rajalakshmi ,M. Baskar ,P.Jayalakshmi “A Novel Solution for EconomizingWater by a Mix of Technologies with a Low Cost Approach”,International Journal of Advanced Science and Technology Vol. 29, No. 7, April 2020
Ram Mohan Rao, P., Murali Krishna, S. & Siva Kumar, A.P. Privacy preservation techniques in big data analytics: a survey. J Big Data 5, 33 (2018). https://doi.org/10.1186/s40537-018-0141-8
Sedayao, Jeff. (2012). Enhancing Cloud Security Using Data Anonymization.
T. Devi and R. G. San, "Data security frameworks in cloud," 2014 International Conference on Science Engineering and Management Research (ICSEMR), 2014, pp. 1-6, doi: 10.1109/ICSEMR.2014.7043610.
Thiagarajan.R, Moorthi. M , Energy consumption and network connectivity based on Novel-LEACH-POS protocol networks,Computer Communications, Elsevier, (0140-3664), vol.149, pp. 90-98.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.