The use of de-identification methods for secure and privacy-enhancing big data analytics in cloud environments

Gloria Bondel, Gonzalo Munilla Garrido, Kevin Baumer, Florian Matthes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Big data analytics are interlinked with distributed processing frameworks and distributed database systems, which often make use of cloud computing services providing the necessary infrastructure. However, storing sensitive data in public clouds leads to security and privacy issues, since the cloud service presents a central point of attack for external adversaries as well as for administrators and other parties which could obtain necessary privileges from the cloud service provider. To enable data security and privacy in such a setting, we argue that solutions using de-identification methods are most suitable. Thus, this position paper presents the starting point for our future work aiming at the development of a privacy-preserving tool based on de-identification methods to meet security and privacy requirements while simultaneously enabling data processing.

Original languageEnglish
Title of host publicationICEIS 2020 - Proceedings of the 22nd International Conference on Enterprise Information Systems
EditorsJoaquim Filipe, Michal Smialek, Alexander Brodsky, Slimane Hammoudi
PublisherSciTePress
Pages338-344
Number of pages7
ISBN (Electronic)9789897584237
DOIs
StatePublished - 2020
Event22nd International Conference on Enterprise Information Systems, ICEIS 2020 - Virtual, Online
Duration: 5 May 20207 May 2020

Publication series

NameICEIS 2020 - Proceedings of the 22nd International Conference on Enterprise Information Systems
Volume2

Conference

Conference22nd International Conference on Enterprise Information Systems, ICEIS 2020
CityVirtual, Online
Period5/05/207/05/20

Keywords

  • Big Data Analytics
  • Cloud Environments
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'The use of de-identification methods for secure and privacy-enhancing big data analytics in cloud environments'. Together they form a unique fingerprint.

Cite this