{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:34:14Z","timestamp":1742970854177,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811337017"},{"type":"electronic","value":"9789811337024"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-3702-4_3","type":"book-chapter","created":{"date-parts":[[2019,1,16]],"date-time":"2019-01-16T05:50:43Z","timestamp":1547617843000},"page":"31-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR Layer"],"prefix":"10.1007","author":[{"given":"Priyank","family":"Jain","sequence":"first","affiliation":[]},{"given":"Manasi","family":"Gyanchandani","sequence":"additional","affiliation":[]},{"given":"Nilay","family":"Khare","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3 (2016). ISSN 2196-1115","DOI":"10.1186\/s40537-016-0059-y"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1109\/ACCESS.2016.2558446","volume":"4","author":"Abid Mehmood","year":"2016","unstructured":"Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy. IEEE Access 4, 1821\u20131834 (2016). \n                    https:\/\/doi.org\/10.1109\/access.2016.2558446","journal-title":"IEEE Access"},{"key":"3_CR3","unstructured":"Big Data Top Challenge 2016. \n                    https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/bdwg\/BigDataTopTenv1.pdf"},{"key":"3_CR4","unstructured":"Big Data Submits. \n                    https:\/\/theinnovationenterprise.com\/summits\/big-data-innovation-mumbai\/eventactivities=5546"},{"key":"3_CR5","unstructured":"The intersection of privacy and security data privacy day event 2012. \n                    https:\/\/concurringopinions.com\/archives\/2012\/01\/the-intersection-of-privacy-and-security-data-privacy-day-event-at-gw-law-school.html"},{"key":"3_CR6","unstructured":"Savas, O., Deng, J.: Book Titled Big Data Analytics in Cybersecurity. CRC Press, Taylor Francis Group"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Sagiroglu, S., Sinanc, D.: Big data: a review. J. Big Data 20\u201324 (2013)","DOI":"10.1109\/CTS.2013.6567202"},{"key":"3_CR8","unstructured":"Chavan, V., Phursule, R.N.: Survey paper on big data. Int. J. Comput. Sci. Inf. Technol. 5(6) (2014)"},{"key":"3_CR9","volume-title":"The Big Data Revolution in Healthcare","author":"P Groves","year":"2013","unstructured":"Groves, P., Kayyali, B., Knott, D., Kuiken, S.V.: The Big Data Revolution in Healthcare. McKinsey & Company, New York (2013)"},{"key":"3_CR10","unstructured":"Lin, J.: MapReduce is good enough the control project. IEEE Comput. 32 (2013)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Patel, A.B., Birla, M., Nair, U.: Addressing big data problem using Hadoop and Map Reduce. In: Nirma University International Conference on Engineering in Proceedings (2012)","DOI":"10.1109\/NUICONE.2012.6493198"},{"key":"3_CR12","unstructured":"Acampora, G., et al.: Data analytics for pervasive health. In: Healthcare Data Analytics (2015). ISSN 533-576"},{"key":"3_CR13","unstructured":"Kulkarni, A.P., Khandelwal, M.: Survey on Hadoop and introduction to YARN. Int. J. Emerg. Technol. Adv. Eng. 4(5) (2014). \n                    www.ijetae.com\n                    \n                  . ISSN 2250-2459"},{"key":"3_CR14","unstructured":"Yu, E., Deng, S.: Understanding software ecosystems: a strategic modeling approach. In: Proceedings of the Workshop on Software Ecosystems 2011, IWSECO-2011, pp. 6\u201316 (2011)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-37134-9_3","volume-title":"Databases in Networked Information Systems","author":"Kyuseok Shim","year":"2013","unstructured":"Shim, K: MapReduce algorithms for big data analysis. In: DNIS. LNCS, pp. 44\u201348 (2013)"},{"key":"3_CR16","unstructured":"Arora, S., Goel, M.: Survey paper on scheduling in Hadoop. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5) (2014)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Evfimievski, S.: Randomization techniques for privacy preserving association rule mining. In: SIGKDD Exploration, vol. 4, no. 2 (2002)","DOI":"10.1145\/772862.772869"},{"key":"3_CR18","unstructured":"Roy, I., Ramadan, H.E., Setty, T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Castro, M. (eds.) Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, pp. 297\u2013312. USENIX Association, San Jose (2010)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Tripathy, K., Mitra, A.: An algorithm to achieve k-anonymity and l-diversity anonymization in social networks. In: Proceedings of Fourth International Conference on Computational Aspects of Social Networks (CA-SoN), Sao Carlos, pp. 126\u2013131 (2012)","DOI":"10.1109\/CASoN.2012.6412390"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Mohammadian, E., Noferesti, M., Jalili, R.: FAST: fast anonymization of big data streams. In: Proceedings of the 2014 International Conference on Big Data Science and Computing, p. 23 (2014)","DOI":"10.1145\/2640087.2644187"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Terzi, D.S., Terzi, R., Sagiroglu, S.: A survey on security and privacy issues in big data. In: Proceedings of ICITST 2015, London, UK, Dec 2015","DOI":"10.1109\/ICITST.2015.7412089"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2016.05.001","volume":"20","author":"Philip Derbeko","year":"2016","unstructured":"Derbeko, P., et al.: Security and privacy aspects in MapReduce on clouds: a survey. Comput. Sci. Rev. 20, 1932\u2013128 (2016)","journal-title":"Computer Science Review"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Kacha, L., Zitouni, A.: An overview on data security in cloud computing. In: CoMeSySo: Cybernetics Approaches in Intelligent Systems, pp. 250\u2013261. Springer (2017)","DOI":"10.1007\/978-3-319-67618-0_23"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Ilavarasi, K., Sathiyabhama, B.: An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. J. Cluster Comput. (2017)","DOI":"10.1007\/s10586-017-1108-9"},{"key":"3_CR25","unstructured":"ApacheHDFS. \n                    http:\/\/hadoop.apache.org\/hdfs"},{"issue":"5","key":"3_CR26","first-page":"55770","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int J Uncertain Fuzz. 10(5), 55770 (2002)","journal-title":"Int J Uncertain Fuzz."},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Zakerdah, H., Aggarwal, C.C., Barker, K.: Privacy-Preserving Big Data Publishing. ACM, La Jolla (2015)","DOI":"10.1007\/978-3-319-14142-8_20"},{"key":"3_CR28","unstructured":"Morey, T., Forbath, T., Schoop, A.: Customer data: designing for transparency and trust. Harv. Bus. Rev. 93\u201395 (2015)"},{"issue":"4","key":"3_CR29","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s00778-006-0039-5","volume":"17","author":"A Friedman","year":"2008","unstructured":"Friedman, A., Wolff, R., Schuster, A.: Providing k-anonymity in data mining. Int. J. Very Large Data Bases 17(4), 789\u2013804 (2008)","journal-title":"Int. J. Very Large Data Bases"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Fung, B., et al.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42\u201344 (2010)","DOI":"10.1145\/1749603.1749605"},{"issue":"5","key":"3_CR31","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2014.2329397","volume":"31","author":"V Cevher","year":"2014","unstructured":"Cevher, V., Becker, S., Schmidt, M.: Convex optimization for big data: scalable, randomized, and parallel algorithms for big data analytics. IEEE Signal Process. Mag. 31(5), 32\u201343 (2014)","journal-title":"IEEE Signal Process. Mag."},{"issue":"1\/2","key":"3_CR32","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1504\/IJBDI.2014.063835","volume":"1","author":"MH Kuo","year":"2014","unstructured":"Kuo, M.H., Sahama, T., Kushniruk, A.W., Borycki, E.M., Grunwell, D.K.: Health big data analytics: current perspectives, challenges and potential solutions. Int. J. Big Data Intell. 1(1\/2), 114\u2013126 (2014)","journal-title":"Int. J. Big Data Intell."},{"issue":"4","key":"3_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"Benjamin C. M. Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010)","journal-title":"ACM Computing Surveys"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Jain, P., Pathak, N., Tapashetti, P., Umesh, A.S.: Privacy-preserving processing of data decision tree based on sample selection and singular value decomposition. In: 2013 9th International Conference on Information Assurance and Security (IAS), Gammarth, pp. 91\u201395 (2013)","DOI":"10.1109\/ISIAS.2013.6947739"},{"issue":"1","key":"3_CR35","first-page":"18","volume":"12","author":"P Jain","year":"2017","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Privacy and security concerns in healthcare big data: an innovative prescriptive. J. Inf. Assur. Secur. 12(1), 18\u201330 (2017)","journal-title":"J. Inf. Assur. Secur."},{"key":"3_CR36","unstructured":"Ko, S.Y, Jeon, K., Morales, R.: The HybrEx model for confidentiality and privacy in cloud computing. In: 3rd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud\u201911, Portland (2011)"},{"key":"3_CR37","unstructured":"Tweepy Dataset Online. \n                    https:\/\/marcobonzanini.com\/2015\/03\/02\/mining-twitter-data-with-python-part-1\/"},{"key":"3_CR38","unstructured":"First Things First\u2014Highmark Makes Healthcare-Fraud Prevention Top Priority with SAS (2006)"},{"key":"3_CR39","unstructured":"Apache Hive. \n                    http:\/\/hive.apache.org"},{"key":"3_CR40","unstructured":"Borthakur, D., Sarma, J.S., Gray, J., Muthukkaruppan, K., Spiegelberg, N., Kuang, H., Krangana Than, D.M.S., Menon, A., Rash, S., Schmidt, R., Amitanand, A.: Apache Hadoop Goes Realtime at Facebook ACM SIGMOD, Athens, Greece (2011). 978-1-4503-0661-4\/11\/06"},{"key":"3_CR41","unstructured":"Mrigank, M., Akashdeep, K., Snehasish, D., Kumar, N.: Analysis of Big Data Using Apache Hadoop and Map Reduce, vol. 4, no. 5 (2014)"},{"key":"3_CR42","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 758\u2013769 (2007)"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Yin, C., Zhang, S., Xi, J., Wang, J.: An improved anonymity model for big data security based on clustering algorithm. In: Combined Special Issues on Security and privacy in social networks (NSS2015) and 18th IEEE International Conference on Computational Science and Engineering (CSE2015), vol. 29,\u00a0Issue 7, 10 Apr 2017","DOI":"10.1002\/cpe.3902"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-3702-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:14:09Z","timestamp":1558145649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-3702-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811337017","9789811337024"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-3702-4_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}