A review of big data challenges and preserving privacy in big data

A Sharma, G Singh, S Rehman - Advances in Data and Information …, 2020 - Springer
We are living in an era where structured and unstructured data is produced, consumed and
stored in enormous amount on frequent basis. Database transactions, social media, images …

A survey on mobile crowd-sensing and its applications in the IoT era

K Abualsaud, TM Elfouly, T Khattab, E Yaacoub… - Ieee …, 2018 - ieeexplore.ieee.org
Mobile crowd-sensing (MCS) is a new sensing paradigm that takes advantage of the
extensive use of mobile phones that collect data efficiently and enable several significant …

Achieving efficient and privacy-preserving truth discovery in crowd sensing systems

G Xu, H Li, C Tan, D Liu, Y Dai, K Yang - Computers & Security, 2017 - Elsevier
Benefiting from the development of network and mobile communication technologies, crowd
sensing systems have emerged as new technology to sense and collect data via mobile …

Effectiveness of anonymization methods in preserving patients' privacy: a systematic literature review

M Langarizadeh, A Orooji… - Health Informatics Meets …, 2018 - ebooks.iospress.nl
Background: An ever growing for application of electronic health records (EHRs) has
improved healthcare providers' communications, access to data for secondary use and …

Data representativeness in accessibility datasets: A meta-analysis

R Kamikubo, L Wang, C Marte, A Mahmood… - Proceedings of the 24th …, 2022 - dl.acm.org
As data-driven systems are increasingly deployed at scale, ethical concerns have arisen
around unfair and discriminatory outcomes for historically marginalized groups that are …

Critical analysis of big data privacy preservation techniques and challenges

S Madan, K Bhardwaj, S Gupta - … : Proceedings of ICICC 2021, Volume 3, 2022 - Springer
In the present age, diversified data—both structured and unstructured, is being produced in
huge amounts from sources like database transactions, audios, images, videos, social …

Analysis of Data Anonymization Techniques in Biometric Authentication System

S Harini, R Dharshini, N Agalya… - … Secure Computing for …, 2024 - Wiley Online Library
In today's smart era, recent advances in digital world technologies paved a way to sneak,
access, and analyze sensitive personal data like bank transfer details, medical records, and …

Crime Based Evaluation of GPS Network Using Machine Learning Techniques

VH Durgapal - 2022 4th International Conference on Smart …, 2022 - ieeexplore.ieee.org
With the increased usage of data transmission, data leakage and privacy protection are
becoming increasingly critical. Data comes in a variety of forms, and the amount of …

[PDF][PDF] Risks of Loss of Personal Data in the Process of Sending and Printing Documents.

O Tymchenko, B Havrysh, O Khamula, S Lysenko… - CITRisk, 2020 - ceur-ws.org
With the introduction of the General Data Protection Regulation, many companies were
forced to make significant changes to their systems to meet the new requirements. General …

A review on various data encryption techniques used in cloud enabled data centre

M Joshi, M Joshi - 2020 International Conference on Intelligent …, 2020 - ieeexplore.ieee.org
Cloud computing is one of the prominence technologies that is expected to roped the
efficiency of IT industry. Due to various turmoil in previous technologies, role of cloud …