Encrypting security for virtualized environments in big data storage with generalized anonymization strategies

https://doi.org/10.53730/ijhs.v6nS9.13005

Authors

  • Seema. J Assistant Professor, Department of CSE, AMCEC, Bengaluru
  • B Vijaya Nirmala Assistant Professor, Department of CSE, AMCEC, Bengaluru
  • Sushma B Malipatil Assistant Professor, Department of CSE, AMCEC, Bengaluru
  • Sheetal. S. R Assistant Professor, Department of CSE, AMCEC, Bengaluru
  • Shwetha K R Assistant Professor, Department of CSE, AMCEC, Bengaluru
  • B. Jaya Karuna Assistant Professor, Department of CSE, AMCEC, Bengaluru

Keywords:

Anonymization, Generalisation, Big Data, Data Encryption, Privacy Protection, Information Sharing

Abstract

Big data security has grown in importance as a result of its strong correlation to users. Because big data contains individually identifying information, it poses a considerable safety issue. To protect personal information, data confidentiality is commonly employed in non-interactive information sharing and transmission settings. This entails hiding identifiable and confidential material from the owners of acquired data.Anonymization is a computational technology that eliminates or alters personal identifying details, resulting in anonymous data which cannot be linked to every single citizen. The anonymization method enables the release of knowledge, allowing for study and assurance. Privacy protection protects sensitive data from a range of threats. Utilizing data encryption and data anonymization is indeed the method of making modifications to the information to be utilised or used in a method which will avoid pertinent data from being identified. Several organisations make data available anonymously to the general public. Employing data anonymization, important bits of private information are masked in order to protect private information.Anonymous data may be stored and accessed in the cloud without fear of being intercepted by others. Anonymization protects against data abuse and insider exploit hazards that lead to regulatory compliance loss.

Downloads

Download data is not yet available.

References

A. Kumar, B. G. Lee, H. Lee and A. Kumari, "Secure storage and access of data in cloud computing," 2012 International Conference on ICT Convergence (ICTC), 2012, pp. 336-339, doi: 10.1109/ICTC.2012.6386854.

Approach in Detecting and Isolation of Malicious Nodes in MANET” Wireless Personal Communication, 119, pages21–35 (2021) Springer Jan 2021

Cong Wang, Qian Wang, Kui Ren and Wenjing Lou, "Ensuring data storage security in Cloud Computing," 2009 17th International Workshop on Quality of Service, 2009, pp. 1-9, doi: 10.1109/IWQoS.2009.5201385.

Inukollu, Venkata &Arsi, Sailaja &Ravuri, Srinivasa. (2014). Security Issues Associated with Big Data in Cloud Computing. International Journal of Network Security & Its Applications. 6. 45-56. 10.5121/ijnsa.2014.6304.

Jain, P., Gyanchandani, M. &Khare, N. Big data privacy: a technological perspective and review. J Big Data 3, 25 (2016). https://doi.org/10.1186/s40537-016-0059-y

Karle, Tanashri& Vora, Deepali. (2017). PRIVACY preservation in big data using anonymization techniques. 340-343. 10.1109/ICDMAI.2017.8073538.

N. L. Kodumru and M. Supriya, "Secure Data Storage in Cloud Using Cryptographic Algorithms," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018, pp. 1-6, doi: 10.1109/ICCUBEA.2018.8697550.

Preethi, P., & Asokan, R. (2019). An attempt to design improved and fool proof safe distribution of personal healthcare records for cloud computing. Mobile Networks and Applications, 24(6), 1755-1762.

Preethi, P., & Asokan, R. (2021). Modelling LSUTE: PKE Schemes for Safeguarding Electronic Healthcare Records Over Cloud Communication Environment. Wireless Personal Communications, 117(4), 2695-2711.

Pronika and S. S. Tyagi, "Secure Data Storage in Cloud using Encryption Algorithm," 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 136-141, doi: 10.1109/ICICV50876.2021.9388388.

R. R. Bobde, A. Khaparde and M. M. Raghuwanshi, "An approach for securing data on Cloud using data slicing and cryptography," 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 2015, pp. 1-5, doi: 10.1109/ISCO.2015.7282356.

R.Thiagarajan, V.BalajiVijayan, Dr.S.Arun, I.Mohan Novel Technique for Automation Billing in Smart Shopping”, International Journal of Scientific & Technology Research, Vol. 9 no.4, March 2020, PP:5363-5369

R.Thiagarajan, Ganesan, Anbarasu, Baskar, Arthi, Rajkumar, Optimised with Secure

R.Thiagarajan,N.R .Rajalakshmi ,M. Baskar ,P.Jayalakshmi “A Novel Solution for EconomizingWater by a Mix of Technologies with a Low Cost Approach”,International Journal of Advanced Science and Technology Vol. 29, No. 7, April 2020

Ram Mohan Rao, P., Murali Krishna, S. & Siva Kumar, A.P. Privacy preservation techniques in big data analytics: a survey. J Big Data 5, 33 (2018). https://doi.org/10.1186/s40537-018-0141-8

Sedayao, Jeff. (2012). Enhancing Cloud Security Using Data Anonymization.

T. Devi and R. G. San, "Data security frameworks in cloud," 2014 International Conference on Science Engineering and Management Research (ICSEMR), 2014, pp. 1-6, doi: 10.1109/ICSEMR.2014.7043610.

Thiagarajan.R, Moorthi. M , Energy consumption and network connectivity based on Novel-LEACH-POS protocol networks,Computer Communications, Elsevier, (0140-3664), vol.149, pp. 90-98.

Published

26-09-2022

How to Cite

Seema, J., Nirmala, B. V., Malipatil, S. B., Sheetal, S. R., Shwetha, K. R., & Karuna, B. J. (2022). Encrypting security for virtualized environments in big data storage with generalized anonymization strategies. International Journal of Health Sciences, 6(S9), 2645–2655. https://doi.org/10.53730/ijhs.v6nS9.13005

Issue

Section

Peer Review Articles