Data masking techniques for NoSQL database security: A systematic review

A Cuzzocrea, H Shahriar - … conference on big data (Big Data), 2017 - ieeexplore.ieee.org
This paper first presents an in-depth study of potential security vulnerabilities in MongoDB
and Cassandra, two popular NoSQL databases. We provide examples of attacks. We then …

Evaluation of data preprocessing and feature selection process for prediction of hourly PM10 concentration using long short-term memory models

İ Aksangür, B Eren, C Erden - Environmental Pollution, 2022 - Elsevier
Studies have confirmed that PM 10, defined as respirable particles with diameters of 10 μm
and smaller, has adverse effects on human health and the environment. Various estimation …

Machine learning methods for generating high dimensional discrete datasets

G Manco, E Ritacco, A Rullo, D Saccà… - … Reviews: Data Mining …, 2022 - Wiley Online Library
The development of platforms and techniques for emerging Big Data and Machine Learning
applications requires the availability of real‐life datasets. A possible solution is to synthesize …

Privacy protection for data-driven smart manufacturing systems

KS Wong, MH Kim - International Journal of Web Services Research …, 2017 - igi-global.com
Abstract The Industrial Internet of Things (IIoT) is a new industrial ecosystem that combines
intelligent and autonomous machines, advanced predictive analytics, and machine-human …

面向异构大数据环境的数据脱敏模型

佟玲玲, 李鹏霄, 段东圣, 任博雅… - 北京航空航天大学学报, 2022 - bhxb.buaa.edu.cn
不同场景下数据类型和脱敏需求的差异, 使得传统的数据脱敏方法难以满足大数据背景下的用户
隐私保护需求. 如何实现异构大数据中敏感信息的精准定向, 高效脱敏, 从而更好地确保数据安全 …

Advancing the EU data economy: Conditions for realizing the full potential of data reuse

B Custers, D Bachlechner - Information Polity, 2017 - content.iospress.com
The rise of big data promises a plethora of opportunities for a data-driven economy,
including accelerated innovation and growth, and increased productivity and …

[PDF][PDF] Design of data masking architecture and analysis of data masking techniques for testing

R GK, BJ Rabi, TN Manjunath, RS Hegadi… - International Journal of …, 2011 - academia.edu
Data masking is the process of obscuring-masking, specific data elements within data
stores. It ensures that sensitive data is replaced with realistic but not real data. The goal is …

A classification module in data masking framework for business intelligence platform in healthcare

O Ali, A Ouda - 2016 IEEE 7th Annual Information Technology …, 2016 - ieeexplore.ieee.org
Healthcare organizations are undergoing tremendous change in analytical computing. The
vehicle for this change is implementing a Business Intelligence (BI) platform, which includes …

Secure and privacy preserving data processing support for active authentication

Y Sun, S Upadhyaya - Information Systems Frontiers, 2015 - Springer
Keystroke dynamics and mouse movements are effective behavioral biometric modalities for
active authentication. However, very little is done on the privacy of collection and …

Data masking model for heterogeneous big data environment

L TONG, P LI, D DUAN, B REN, Y LI - 北京航空航天大学学报, 2022 - bhxb.buaa.edu.cn
Due to the variety of data types and desensitization demand in different scenarios, traditional
data masking methods cannot meet the user privacy protection requirements in the …