{"title":"大数据安全和隐私技术","authors":"Lamia El Haourani, A. A. E. Kalam, A. A. Ouahman","doi":"10.1145/3386723.3387841","DOIUrl":null,"url":null,"abstract":"Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"98 13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Big Data security and privacy techniques\",\"authors\":\"Lamia El Haourani, A. A. E. Kalam, A. A. Ouahman\",\"doi\":\"10.1145/3386723.3387841\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods\",\"PeriodicalId\":139072,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Networking, Information Systems & Security\",\"volume\":\"98 13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Networking, Information Systems & Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3386723.3387841\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3386723.3387841","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods