118
Views
0
CrossRef citations to date
0
Altmetric
Articles

Big Data analytics for privacy through ND-homomorphic encryption

&
Pages 64-71 | Received 16 Jan 2022, Accepted 13 Apr 2022, Published online: 11 May 2022

References

  • Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. ACM SIGMOD Record, 29(2), 439–450. https://doi.org/10.1145/335191.335438
  • Al-Jarrah, O. Y., Yoo, P. D., Muhaidat, S., Karagiannidis, G. K., & Taha, K. (Sep. 2015). efficient machine learning for big data: A review. Big Data Res, 2(3), 87–93. https://doi.org/10.1016/j.bdr.2015.04.001
  • Awan, S., Li, F., Luo, B., & Liu, M. (2019). Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain. Proceedings of the 2019 ACM SIGSAC conference on Computer and communications security, 2561–2563.
  • Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning: Data mining, inference, and prediction (Springer series in statistics). Springer.
  • Liu, H., & Motoda, H. (2013). Instance selection and construction for data mining, vol. 608. Springer.
  • Lu, Y., Huang, X., Dai, Y., Maharjan, S., & Zhang, Y. (2020). Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Transactions on Industrial Informatics, 16(6), 4177–4186. https://doi.org/10.1109/TII.2019.2942190
  • Lyu, L., Yu, J., Nandakumar, K., Li, Y., Ma, X., & Jin, J. (2019). “Towards fair and decentralized privacy-preserving deep learning with blockchain,” arXiv preprint arXiv:1906.01167.
  • Nandhini, S., Khanna, P., Jain, S., & Pal, R. (2020). An integrated approach to encompass Big data cloud adoption using data mining. Journal of Computational and Theoretical Nanoscience, 17(8), 3383–3388. https://doi.org/10.1166/jctn.2020.9191
  • Saravanan, S., & Sivabalakrishnan, M. (2021). A hybrid chaotic map with coefficient improved whale optimization based parameter tuning for enhanced image encryption. Soft Computing, 25(7), 5299–5322. https://doi.org/10.1007/s00500-020-05528-w
  • Sun, X., Zhang, P., Liu, J. K., Yu, J., & Xie, W. (2018). Private machine learning classification based on fully homomorphic encryption. IEEE Transactions on Emerging Topics in Computing, 8(2), 352–364. https://doi.org/10.1109/TETC.2018.2794611
  • Wang, S., Tuor, T., Salonidis, T., Leung, K. K., Makaya, C., He, T., & Chan, K. (2019b). Adaptive federated learning in resource constrained edge computing systems. IEEE Journal on Selected Areas in Communications, 37(6), 1205–1221. https://doi.org/10.1109/JSAC.2019.2904348
  • Wang, X., Han, Y., Wang, C., Zhao, Q., Chen, X., & Chen, M. (2019a). In-edge ai: Intelligentizing mobile edge computing, caching and communication by federated learning. IEEE Network, 33(5), 156–165. https://doi.org/10.1109/MNET.2019.1800286
  • Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (Oct. 2014). Information security in big data: Privacy and data mining. IEEE Access, 2, 1149–1176. https://doi.org/10.1109/ACCESS.2014.2362522
  • Zhao, Y., Zhao, J., Jiang, L., Tan, R., Niyato, D., Li, Z., Lyu, L., & Liu, Y. (2021). Privacy-Preserving blockchain-based federated learning for IoT devices. IEEE Internet of Things Journal, 8(3), 1817–1829. https://doi.org/10.1109/JIOT.2020.3017377

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.