{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T03:41:55Z","timestamp":1772336515128,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscit.2016.7751634","type":"proceedings-article","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T21:41:39Z","timestamp":1480023699000},"page":"268-272","source":"Crossref","is-referenced-by-count":73,"title":["A survey of security and privacy in big data"],"prefix":"10.1109","author":[{"given":"Haina","family":"Ye","sequence":"first","affiliation":[]},{"given":"Xinzhou","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Mingqiang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Lexi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218422"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2541658"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.5"},{"key":"ref32","article-title":"Anonymizing moving objects (how to hide a MOB in a crowd?[J]","author":"yarovoy","year":"2009","journal-title":"Extending Database Technology"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1503402.1503413"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.05.003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080321"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.66"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2014.7031175"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.417"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412089"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.7085614"},{"key":"ref12","article-title":"Challenges and Solutions of Information Security Issues in the Age of Big Data[J]","author":"yang","year":"2016","journal-title":"China Communications Magazine"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015496"},{"key":"ref14","article-title":"NIST Big Data Interoperability Framework","volume":"4","year":"2015","journal-title":"Security and Privacy"},{"key":"ref15","first-page":"112","article-title":"Research on Security Connotation and Response Strategies for Big Data[J]","volume":"2","author":"hu","year":"2014","journal-title":"Telecommunications Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863131"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2362522"},{"key":"ref18","first-page":"68","article-title":"A Survey on Security Issues in Big Data and NoSQL[J]","volume":"4","author":"sahafizadeh","year":"2015","journal-title":"Advances in Computer Science An International Journal"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.126"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2012.1.8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.163"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.29"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2406883"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2544300"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516917"},{"key":"ref7","year":"2013","journal-title":"Expanded Top Ten Big Data Security and Privacy Challenges"},{"key":"ref2","article-title":"WCDMA Data based LTE Site Selection Scheme in LTE Deployment[C]","author":"xu","year":"2015","journal-title":"Proc 2015 International Conference on Signal and Information Processing(lCSINC)"},{"key":"ref9","article-title":"Big Data [R]","year":"2014","journal-title":"Preliminary report"},{"key":"ref1","article-title":"A Novel Big Data Based Telecom Operation Architecture[C]","author":"cheng","year":"2015","journal-title":"Proc 2015 International Conference on Signal and Information Processing(ICSINC)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2015.7124885"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2533668"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref42","article-title":"Differentially Private Trajectory Data Publication[J]","author":"chen","year":"2011","journal-title":"ArXiv e-prints"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1882471.1882473"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"239","DOI":"10.5897\/IJPS11.1795","article-title":"Privacy Preserving Data Publishing: Review[J]","volume":"10","author":"rashid","year":"2015","journal-title":"InternationalJournal of Physical Sciences"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2743025"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031336"}],"event":{"name":"2016 16th International Symposium on Communications and Information Technologies (ISCIT)","location":"Qingdao, China","start":{"date-parts":[[2016,9,26]]},"end":{"date-parts":[[2016,9,28]]}},"container-title":["2016 16th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7736510\/7751579\/07751634.pdf?arnumber=7751634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:26:32Z","timestamp":1498364792000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7751634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/iscit.2016.7751634","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}