17,408 research outputs found

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    Publishing Microdata with a Robust Privacy Guarantee

    Full text link
    Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition. Yet, no method proposed to date explicitly bounds the percentage of information an adversary gains after seeing the published data for each sensitive value therein. This paper introduces beta-likeness, an appropriately robust privacy model for microdata anonymization, along with two anonymization schemes designed therefor, the one based on generalization, and the other based on perturbation. Our model postulates that an adversary's confidence on the likelihood of a certain sensitive-attribute (SA) value should not increase, in relative difference terms, by more than a predefined threshold. Our techniques aim to satisfy a given beta threshold with little information loss. We experimentally demonstrate that (i) our model provides an effective privacy guarantee in a way that predecessor models cannot, (ii) our generalization scheme is more effective and efficient in its task than methods adapting algorithms for the k-anonymity model, and (iii) our perturbation method outperforms a baseline approach. Moreover, we discuss in detail the resistance of our model and methods to attacks proposed in previous research.Comment: VLDB201

    Providing Security in Collaborative Data Publishing from Heterogeneity Attack

    Get PDF
    In Collaborative data publishing the data is distributed among multiple data providers or data owners. The main concern of collaborative data publishing is while publishing data preserving the individual’s privacy. While publishing collaborative data to multiple data provider two types of problems are more likely to occur, first is outsider attack and second is insider attack. The attack, which is performed by people who is not data provider, is called as outsider attack. Whereas attack is performed by colluding data provider who may use their own data records to get the data records shared by other data providers, is called as outsider attack. Insider attack is performed by people who are data provider or data owner. In this paper to overcome the problem of such attacks in collaborative data publishing the encryption strategy can be used such as 3DES which provides individual’s data protection by using three keys. Along with MD5 key generation mechanism

    Aligning anti-money laundering, combating of financing of terror and financial inclusion : Questions to consider when FATF standards are clarified

    Full text link
    Purpose &ndash; The purpose of this paper is to identify key questions that should be addressed to enable the Financial Action Task Force (FATF) to provide guidance regarding the alignment of anti-money laundering, combating of financing of terror and financial inclusion objectives.Design/methodology/approach &ndash; The paper draws on relevant research and documents of the FATF to identify questions that are relevant to consider when it formulates guidance regarding the alignment between financial integrity and financial inclusion objectives.Findings &ndash; The FATF advises that its risk-based approach enables countries and institutions to further financial inclusion. It is, however, not clear what the FATF means when its uses the terms &ldquo;risk&rdquo; and &ldquo;low risk&rdquo;. It is also unclear whether current proposals for financial inclusion regulatory models will necessarily limit money laundering (ML) aswell as terror financing risks to levels that can be described as &ldquo;low&rdquo;. The FATF will need to clarify its own thinking regarding low money laundering and low terror financing risk before it will be able to provide clear guidance to national regulators and financial institutions.Originality/value &ndash; This paper was drafted to inform current FATF discussions regarding guidance on financial inclusion. The questions are relevant to all stakeholders in financial regulation.<br /
    corecore