{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:05:55Z","timestamp":1770915955556,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s40537-018-0141-8","type":"journal-article","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:37:39Z","timestamp":1537601859000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":70,"title":["Privacy preservation techniques in big data analytics: a survey"],"prefix":"10.1186","volume":"5","author":[{"given":"P.","family":"Ram Mohan Rao","sequence":"first","affiliation":[]},{"given":"S.","family":"Murali Krishna","sequence":"additional","affiliation":[]},{"given":"A. P.","family":"Siva Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"issue":"1","key":"141_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s00500-017-2536-4","volume":"22","author":"Pietro Ducange","year":"2018","unstructured":"Ducange Pietro, Pecori Riccardo, Mezzina Paolo. A glimpse on big data analytics in the framework of marketing strategies. Soft Comput. 2018;22(1):325\u201342.","journal-title":"Soft Comput"},{"issue":"1","key":"141_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10115-016-0936-x","volume":"50","author":"Arun Chauhan","year":"2017","unstructured":"Chauhan Arun, Kummamuru Krishna, Toshniwal Durga. Prediction of places of visit using tweets. Knowl Inf Syst. 2017;50(1):145\u201366.","journal-title":"Knowl Inf Syst"},{"key":"141_CR3","unstructured":"Yang D, Bingqing Q, Cudre-Mauroux P. Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans Knowl Data Eng. 2018. ISSN (Print):1041-4347, ISSN (Electronic):1558-2191."},{"key":"141_CR4","doi-asserted-by":"crossref","unstructured":"Liu Y et al. A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans Ind Inf. 2018.","DOI":"10.1109\/TII.2018.2809672"},{"key":"141_CR5","unstructured":"Duncan GT et al. Disclosure limitation methods and information loss for tabular data. In: Confidentiality, disclosure and data access: theory and practical applications for statistical agencies. 2001. p. 135\u2013166."},{"issue":"393","key":"141_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1080\/01621459.1986.10478229","volume":"81","author":"GT Duncan","year":"1986","unstructured":"Duncan GT, Diane L. Disclosure-limited data dissemination. J Am Stat Assoc. 1986;81(393):10\u20138.","journal-title":"J Am Stat Assoc."},{"issue":"2","key":"141_CR7","first-page":"313","volume":"9","author":"Diane Lambert","year":"1993","unstructured":"Lambert Diane. Measures of disclosure risk and harm. J Off Stat. 1993;9(2):313.","journal-title":"J Off Stat"},{"key":"141_CR8","first-page":"111","volume-title":"Data privacy: users\u2019 thoughts on quantified self personal data. Self-Tracking","author":"K Spiller","year":"2018","unstructured":"Spiller K, et al. Data privacy: users\u2019 thoughts on quantified self personal data. Self-Tracking. Cham: Palgrave Macmillan; 2018. p. 111\u201324."},{"key":"141_CR9","unstructured":"Hettig M, Kiss E, Kassel J-F, Weber S, Harbach M. Visualizing risk by example: demonstrating threats arising from android apps. In: Smith M, editor. Symposium on usable privacy and security (SOUPS), Newcastle, UK, July 24\u201326, 2013."},{"key":"141_CR10","unstructured":"Bayardo RJ, Agrawal A. Data privacy through optimal k-anonymization. In: Proceedings 21st international conference on data engineering, 2005 (ICDE 2005). Piscataway: IEEE; 2005."},{"key":"141_CR11","doi-asserted-by":"crossref","unstructured":"Iyengar S. Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. New York: ACM; 2002.","DOI":"10.1145\/775088.775089"},{"key":"141_CR12","doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R. Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD international conference on management of data. New York: ACM; 2005.","DOI":"10.1145\/1066157.1066164"},{"key":"141_CR13","doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R. Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd international conference (ICDE\u201906) on data engineering, 2006. New York: ACM; 2006.","DOI":"10.1109\/ICDE.2006.101"},{"key":"141_CR14","unstructured":"Samarati, Pierangela, and Latanya Sweeney. In: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998."},{"issue":"05","key":"141_CR15","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney Latanya. Achieving k-anonymity privacy protection using generalization and suppression. In J Uncertain Fuzziness Knowl Based Syst. 2002;10(05):571\u201388.","journal-title":"In J Uncertain Fuzziness Knowl Based Syst"},{"issue":"05","key":"141_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney Latanya. k-Anonymity: a model for protecting privacy. Int J Uncertain, Fuzziness Knowl Based Syst. 2002;10(05):557\u201370.","journal-title":"Int J Uncertain, Fuzziness Knowl Based Syst"},{"key":"141_CR17","unstructured":"Williams R. On the complexity of optimal k-anonymity. In: Proc. 23rd ACM SIGMOD-SIGACT-SIGART symp. principles of database systems (PODS). New York: ACM; 2004."},{"key":"141_CR18","unstructured":"Machanavajjhala A et al. L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE\u201906), 2006. Piscataway: IEEE; 2006."},{"key":"141_CR19","doi-asserted-by":"crossref","unstructured":"Xiao X, Yufei T. Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD international conference on Management of data. New York: ACM; 2006.","DOI":"10.1145\/1142473.1142500"},{"issue":"2","key":"141_CR20","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner Y, Tomasi T, Guibas LJ. The earth mover\u2019s distance as a metric for image retrieval. Int J Comput Vision. 2000;40(2):99\u2013121.","journal-title":"Int J Comput Vision"},{"key":"141_CR21","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"A general survey of privacy-preserving data mining models and algorithms. Privacy-preserving data mining","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal CC, Philip SY. A general survey of privacy-preserving data mining models and algorithms. Privacy-preserving data mining. Springer: US; 2008. p. 11\u201352."},{"key":"141_CR22","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.future.2016.05.005","volume":"78","author":"R Jiang","year":"2018","unstructured":"Jiang R, Lu R, Choo KK. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gen Comput Syst. 2018;78:392\u2013401.","journal-title":"Future Gen Comput Syst"},{"key":"141_CR23","unstructured":"Wang K, Yu PS, Chakraborty S. Bottom-up generalization: A data mining solution to privacy protection. In: Fourth IEEE international conference on data mining, 2004 (ICDM\u201904). Piscataway: IEEE; 2004."},{"key":"141_CR24","unstructured":"Fung BCM, Wang K, Yu PS. Top-down specialization for information and privacy preservation. In: Proceedings 21st international conference on data engineering, 2005 (ICDE 2005). Piscataway: IEEE; 2005."},{"key":"141_CR25","doi-asserted-by":"crossref","unstructured":"Zhang X et al. A MapReduce based approach of scalable multidimensional anonymization for big data privacy preservation on cloud. In: Third international conference on cloud and green computing (CGC), 2013. Piscataway: IEEE; 2013.","DOI":"10.1109\/CGC.2013.24"},{"issue":"2","key":"141_CR26","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, et al. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Trans Parallel Distrib Syst. 2014;25(2):363\u201373.","journal-title":"IEEE Trans Parallel Distrib Syst."},{"issue":"1","key":"141_CR27","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1186\/s40537-017-0104-5","volume":"4","author":"M Al-Zobbi","year":"2017","unstructured":"Al-Zobbi M, Shahrestani S, Ruan C. Improving MapReduce privacy by implementing multi-dimensional sensitivity-based anonymization. J Big Data. 2017;4(1):45.","journal-title":"J Big Data."},{"key":"141_CR28","doi-asserted-by":"crossref","unstructured":"Al-Zobbi M, Shahrestani S, Ruan C. Implementing a framework for big data anonymity and analytics access control. In: Trustcom\/BigDataSE\/ICESS, 2017 IEEE. Piscataway: IEEE; 2017.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.325"},{"key":"141_CR29","unstructured":"Schneider C. IBM Blogs; 2016. https:\/\/www.ibm.com\/blogs\/watson\/2016\/05\/biggest-data-challenges-might-not-even-know\/ ."},{"key":"141_CR30","unstructured":"TCS. Emphasizing the need for government regulations on data privacy; 2016. https:\/\/www.tcs.com\/content\/dam\/tcs\/pdf\/technologies\/Cyber-Security\/Abstract\/Strengthening-Privacy-Protection-with-the-European-General-Data-Protection-Regulation.pdf ."},{"issue":"2","key":"141_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2018.1700231","volume":"56","author":"X He","year":"2018","unstructured":"He X, et al. Qoe-driven big data architecture for smart city. IEEE Commun Mag. 2018;56(2):88\u201393.","journal-title":"IEEE Commun Mag."},{"key":"141_CR32","doi-asserted-by":"crossref","unstructured":"Ramakrishnan R et al. Azure data lake store: a hyperscale distributed file service for big data analytics. In: Proceedings of the 2017 ACM international conference on management of data. New York: ACM; 2017.","DOI":"10.1145\/3035918.3056100"},{"key":"141_CR33","doi-asserted-by":"crossref","unstructured":"Beheshti A et al. Coredb: a data lake service. In: Proceedings of the 2017 ACM on conference on information and knowledge management. New York: ACM; 2017.","DOI":"10.1145\/3132847.3133171"},{"key":"141_CR34","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-319-69471-9_14","volume-title":"Cyberspace Safety and Security","author":"Tao Shang","year":"2017","unstructured":"Shang T et al. A DP Canopy K-means algorithm for privacy preservation of Hadoop platform. In: International symposium on cyberspace safety and security. Cham: Springer; 2017."},{"issue":"8","key":"141_CR35","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/TPDS.2018.2809624","volume":"29","author":"Qi Jia","year":"2018","unstructured":"Jia Q et al. Preserving model privacy for machine learning in distributed systems. IEEE Trans Parallel Distrib Syst. 2018;29(8).","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"141_CR36","doi-asserted-by":"crossref","unstructured":"Psychoula I et al. A deep learning approach for privacy preservation in assisted living. arXiv preprint arXiv:1802.09359 . 2018.","DOI":"10.1109\/PERCOMW.2018.8480247"},{"key":"141_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-0964-6","volume-title":"Big data analytics with spark: a practitioner\u2019s guide to using spark for large scale data analysis","author":"M Guller","year":"2015","unstructured":"Guller M. Big data analytics with spark: a practitioner\u2019s guide to using spark for large scale data analysis. New York: Apress; 2015."},{"issue":"5","key":"141_CR38","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TKDE.2007.1015","volume":"19","author":"BCM Fung","year":"2007","unstructured":"Fung BCM, Wang K, Philip SY. Anonymzing classification data for privacy preservation. IEEE Trans Knowl Data Eng. 2007;19(5):711\u201325.","journal-title":"IEEE Trans Knowl Data Eng."}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-018-0141-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40537-018-0141-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-018-0141-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T11:51:51Z","timestamp":1662119511000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-018-0141-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,22]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["141"],"URL":"https:\/\/doi.org\/10.1186\/s40537-018-0141-8","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,22]]},"assertion":[{"value":"21 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"33"}}