Abstract

Incredible amounts of data is being generated by various organizations like hospitals, banks, e-commerce, retail and supply chain, etc. by virtue of digital technology. Not only humans but machines also contribute to data in the form of closed circuit television streaming, web site logs, etc. Tons of data is generated every minute by social media and smart phones. The voluminous data generated from the various sources can be processed and analyzed to support decision making. However data analytics is prone to privacy violations. One of the applications of data analytics is recommendation systems which is widely used by ecommerce sites like Amazon, Flip kart for suggesting products to customers based on their buying habits leading to inference attacks. Although data analytics is useful in decision making, it will lead to serious privacy concerns. Hence privacy preserving data analytics became very important. This paper examines various privacy threats, privacy preservation techniques and models with their limitations, also proposes a data lake based modernistic privacy preservation technique to handle privacy preservation in unstructured data.

Highlights

  • There is an exponential growth in volume and variety of data as due to diverse applications of computers in all domain areas

  • One of the prominent applications of data analytics is recommendation systems which is widely used by ecommerce sites like Amazon, Flip kart for suggesting products to customers based on their buying habits

  • As part of systematic literature review, it has been observed that all existing mechanisms of privacy preservation are with respect to structured data

Read more

Summary

Introduction

There is an exponential growth in volume and variety of data as due to diverse applications of computers in all domain areas. Privacy preservation methods Many Privacy preserving techniques were developed, but most of them are based on anonymization of data. Classification and Clustering algorithms can be applied on distributed data but it does not ensure privacy.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call