28 research outputs found
Protection of big data privacy
In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of privacy violation is increased. There have been a number of privacy-preserving mechanisms developed for privacy protection at different stages (e.g., data generation, data storage, and data processing) of a big data life cycle. The goal of this paper is to provide a comprehensive overview of the privacy preservation mechanisms in big data and present the challenges for existing mechanisms. In particular, in this paper, we illustrate the infrastructure of big data and the state-of-the-art privacy-preserving mechanisms in each stage of the big data life cycle. Furthermore, we discuss the challenges and future research directions related to privacy preservation in big data
Recommended from our members
Runtime monitoring of security SLAs for big data pipelines: design implementation and evaluation of a framework for monitoring security SLAs in big data pipelines with the assistance of run-time code instrumentation
The Big Data processing ecosystem has been constantly growing in recent years. This has been significantly reinforced by the advent of cloud computing platforms where Big Data analytics can be offered on an as-a-service basis. The ease with which users can leverage the capabilities of Big Data processing frameworks in the cloud has made them a popular solution with low up-front expenditure and a flexible deployment model. In spite of their cost benefits and flexibility of use, Big Data services in cloud platforms present us with an array of new challenges compared to traditional web services especially in the domain of data security and privacy. Their distributed nature makes them more dynamic with regards to deployment and execution but at the same time it exacerbates challenges related to data and operation security since both data and operations are shared across multiple nodes. Inevitably, distributing data and operations on multiple nodes leads to an increase in the attack surface. Given the need for systems that react fast and produce results as quickly as possible, more emphasis has been placed on performance and less so on security. Having said that, as the use of cloud computing is becoming more widespread, concerns with regards to non-functional properties such as data security are becoming more pronounced for the users. Runtime security monitoring is a mechanism that can be employed to alleviate some of the issues that emerge with respect to the activity of security monitoring for Big Data analytics services that are outsourced in the cloud. In this thesis we make the case for a monitoring framework where monitoring events are collected and evaluated against a set of monitoring rules that describe monitorable security properties of the system. The framework that we put forward can be used to assess the level of security of Big Data analytics pipelines at runtime. For our proof of concept we examine three security properties namely the service response time, the location of execution of service operations and the integrity of the intermediate data produced during the service execution
Space transportation system and associated payloads: Glossary, acronyms, and abbreviations
A collection of some of the acronyms and abbreviations now in everyday use in the shuttle world is presented. It is a combination of lists that were prepared at Marshall Space Flight Center and Kennedy and Johnson Space Centers, places where intensive shuttle activities are being carried out. This list is intended as a guide or reference and should not be considered to have the status and sanction of a dictionary
5th International Conference on Nanomaterials Science and Mechanical Engineering
No abstract available.publishe
Factors Influencing Customer Satisfaction towards E-shopping in Malaysia
Online shopping or e-shopping has changed the world of business and quite a few people have
decided to work with these features. What their primary concerns precisely and the responses from
the globalisation are the competency of incorporation while doing their businesses. E-shopping has
also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce
industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction
while operating in the e-retailing environment. It is very important that customers are satisfied with
the website, or else, they would not return. Therefore, a crucial fact to look into is that companies
must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s
point of view. With is in mind, this study aimed at investigating customer satisfaction
towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students
randomly selected from various public and private universities located within Klang valley area.
Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for
further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer
satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust,
design of the website, online security and e-service quality. Finally, recommendations and future
study direction is provided.
Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia
Space Transportation System and associated payloads: Glossary, acronyms, and abbreviations
A collection of acronyms now in everyday use in the Shuttle world are listed. It is a combination of lists that were prepared at the Kennedy and Johnson Space Centers and by the Air Force
Space Transportation System and associated payloads: Glossary, acronyms, and abbreviations
A collection of acronyms in everyday use concerning shuttle activities is presented. A glossary of terms pertaining to the Space Transportation System is included
Volume reduction of municipal solid wastes contaminated with radioactive cesium by ferrocyanide coprecipitation technique
Municipal solid wastes (MSW) with elevated concentrations of radioactive cesium (rad-Cs hereafter) have been generated in some areas of Japan in the aftermath of the Fukushima Daiichi Nuclear Power Plant (F1 hereafter) accident. Both recycling and final disposal of the contaminated MSW have become a difficult problem in the affected areas, resulting in accumulation of treated residues in the treatment facilities. The rad-Cs in MSW, especially fly ash, often showed a high leaching rate. Extraction of contaminated MSW with water or hot oxalic acid followed by selective removal of rad-Cs from the extract using ferrocyanide (Fer hereafter) coprecipitation technique could be an ultimate solution for waste volume reduction. The MSW extracts contain various metal components as well as chelating reagents like oxalic acid, and are often very saline. The composition of the extract varies widely depending on waste sources, applied treatment techniques, and rad-Cs extraction method etc. The applicability of the Fer coprecipitation technique had to be tested and validated before it could be applied for actual treatment. In this work, we applied the Fer technique and observed removal of cesium (Cs) from water and oxalic acid extracts (all spiked with rad-Cs tracer or stable Cs) of various MSW samples collected from uncontaminated areas. Finally, the Fer technique was applied on site for removal of rad-Cs in the extracts of contaminated MSW. By modifying coprecipitation conditions according to solution matrix, Cs removal rates of higher than 95 % could be obtained
Aeronautical Engineering: A continuing bibliography with indexes (supplement 188)
This bibliography lists 477 reports, articles and other documents introduced into the NASA scientific and technical information system in May 1985. The coverage includes documents on the engineering and theoretical aspects of design, construction, evaluation, testing, operation, and performance of aircraft (including aircraft engines) and associated components, equipment and systems