Securing Private Data Sharing in Multi-Party Analytics

Author(s):  
Gowtham Bellala
Keyword(s):  
Author(s):  
Antonio Famulari ◽  
Francesco Longo ◽  
Giuseppe Campobello ◽  
Thomas Bonald ◽  
Marco Scarpa
Keyword(s):  

Author(s):  
Bogdan C. Popescu ◽  
Bruno Crispo ◽  
Andrew S. Tanenbaum
Keyword(s):  

2019 ◽  
Vol 96 ◽  
pp. 1-10
Author(s):  
Giuseppe Bianchi ◽  
Tooska Dargahi ◽  
Alberto Caponi ◽  
Mauro Conti
Keyword(s):  

Nature ◽  
2020 ◽  
Vol 578 (7796) ◽  
pp. 515-515 ◽  
Author(s):  
Sylvain Coutu ◽  
Inbal Becker-Reshef ◽  
Alyssa K. Whitcraft ◽  
Chris Justice

Author(s):  
Marmar Moussa ◽  
Steven A. Demurjian

This chapter presents a survey of the most important security and privacy issues related to large-scale data sharing and mining in big data with focus on differential privacy as a promising approach for achieving privacy especially in statistical databases often used in healthcare. A case study is presented utilizing differential privacy in healthcare domain, the chapter analyzes and compares the major differentially private data release strategies and noise mechanisms such as the Laplace and the exponential mechanisms. The background section discusses several security and privacy approaches in big data including authentication and encryption protocols, and privacy preserving techniques such as k-anonymity. Next, the chapter introduces the differential privacy concepts used in the interactive and non-interactive data sharing models and the various noise mechanisms used. An instrumental case study is then presented to examine the effect of applying differential privacy in analytics. The chapter then explores the future trends and finally, provides a conclusion.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 224
Author(s):  
N Rajkumar ◽  
E Kannan

Cloud Computing is an emerging technology that uses the internet and remote servers to save information and application. Cloud computing enables customers and organizations to utilize applications without establishment and access their own documents at any computer with internet access. Collusion Resistant Secured the way to deal the fulfillment of an abnormal state of security with complete protection. A large portion of these techniques depend on a presumption that semi-trusted and arrangement is absent. In this paper, we concentrate on the issue of conspiracies, in which a few gatherings may connive and share their record to find the private data of different gatherings. The other related works better than this is more secure. This paper reveals an overview and study of collusion resistance techniques in more secure and efficient way for data sharing in cloud storage.


Sign in / Sign up

Export Citation Format

Share Document