Back to Search Start Over

A Pursuit of Sustainable Privacy Protection in Big Data Environment by an Optimized Clustered-Purpose Based Algorithm.

Authors :
Ghani, Norjihan Binti Abdul
Ahmad, Muneer
Mahmoud, Zahra
Mehmood, Raja Majid
Source :
Intelligent Automation & Soft Computing; 2020, Vol. 26 Issue 6, p1217-1231, 15p
Publication Year :
2020

Abstract

Achievement of sustainable privacy preservation is mostly very challenging in a resource shared computer environment. This challenge demands a dedicated focus on the exponential growth of big data. Despite the existence of specific privacy preservation policies at the organizational level, still sustainable protection of a user's data at various levels, i.e., data collection, utilization, reuse, and disclosure, etc. have not been implemented to its spirit. For every personal data being collected and used, organizations must ensure that they are complying with their defined obligations. We are proposing a new clustered-purpose based access control for users' sustainable data privacy protection in a big data environment. The clustered-purpose based access control significantly contributes to handling the personal data for stated, unambiguous, and genuine purposes. The proposed algorithm picks specific records from the sample space. It ensures the sustainability and utilization of data for intended purposes by validating the existing privacy tags, assigning new privacy tags based on a clustered-purpose based approach. The proposed method equally ensures the security and sustainable privacy aspects of existing as well as new personal data managed inside large data-bases repositories. The comparative analysis of significant results presents the outperformance of the proposed algorithm as compared to existing non-purpose based conventional methods of sustainable privacy preservation. The proposed algorithm clusters the large datasets in a big data environment and allows only authorized access to users. The current study is limited to purpose-based access control based on privacy tags. However, future research can also consider other types of privacy protection scenarios in a shared environment. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
10798587
Volume :
26
Issue :
6
Database :
Complementary Index
Journal :
Intelligent Automation & Soft Computing
Publication Type :
Academic Journal
Accession number :
148281817
Full Text :
https://doi.org/10.32604/iasc.2020.011731