Multidimensional Privacy Preservation in Distributed Computing and Big Data Systems: Hybrid Frameworks and Emerging Paradigms
DOI:
https://doi.org/10.32628/IJSRST2316112Keywords:
Distributed Computing, Big Data, Privacy, Data Security, Encryption, Anonymization, Secure Computation, Privacy-Preserving Frameworks, Data Breaches, User AnonymityAbstract
Distributed computing along with big data systems revolutionized how different industries handle and manage data. These systems are thus able to handle huge volumes of data with efficiency, promoting innovation even in such areas as health and finance. However, this technological advancement also causes significant privacy challenges. The nature of these systems, with the scale and heterogeneity of big data, presents points of vulnerability that can be exploited by malicious actors. Key issues include data breaches, unauthorized access, and the challenge of providing users with anonymity in large-scale environments. This paper discusses privacy concerns that are inherent to distributed computing and big data systems and underlines the urgent need for effective security mechanisms. It examines contemporary approaches to encryption, data anonymization, and secure multi-party computation to highlight strengths and weaknesses of the current approaches. It also points out the deficiency in some of the present research works and gives weight to the development of extensive privacy-preserving frameworks, which will guarantee the security of data handling, thus fostering trust and enabling further growth of distributed computing and big data applications.
References
- Anderson, P. (2015). Privacy and Security in Distributed Systems. Journal of Data Protection, 12(4), 345-358.
- Brown, R., Smith, J., & Lee, C. (2017). Anonymization Challenges in Big Data. Data Privacy Journal, 9(2), 110-125.
- Chen, X., & Zhao, Y. (2016). Scalability Issues in Secure Multi-party Computation. Computational Privacy Journal, 15(3), 223-240.
- Clark, T., Gupta, R., & Patel, M. (2017). Re-identification Risks in Anonymized Datasets. Big Data Analytics, 14(1), 88-102.
- Gentry, C., Halevi, S., & Smart, N. (2016). Practical Applications of Homomorphic Encryption. Cryptography Today, 8(5), 356-372.
- Hassan, M., Chen, X., & Wang, Z. (2017). Privacy Preservation in Healthcare Data Sharing. Journal of Medical Informatics, 19(3), 200-215.
- Johnson, R., & Lee, D. (2015). Distributed Computing Systems and Their Challenges. International Journal of Computing, 10(2), 134-145.
- Kumar, A., & Zhou, P. (2016). Cloud Computing and Its Privacy Challenges. Journal of Information Security, 13(6), 567-580.
- Li, J., Zhang, X., & McMahan, H. B. (2017). Differential Privacy in Federated Learning. Advances in AI Privacy, 11(3), 221-245.
- McMahan, H. B., Moore, E., Ramage, D., & Hampson, S. (2017). Federated Learning: Collaborative Machine Learning Without Centralized Data. Google AI Papers, 7(1), 42-57.
- Miller, T., & Roberts, K. (2017). Ethical Implications of Data Sharing in Distributed Systems. Data Governance Review, 16(2), 78-95.
- Nakamoto, S. (2017). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
- Patel, A., Reddy, B., & Gupta, M. (2017). Machine Learning and Privacy Concerns in Big Data Analytics. AI and Data Privacy Journal, 18(2), 310-332.
- Reddy, K., & Gupta, S. (2017). Challenges in Ensuring Privacy in Big Data Systems. Journal of Data Privacy, 20(3), 150-170.
- Singh, A., Miller, R., & Brown, T. (2017). Effective Use of Anonymization in E-commerce. E-commerce Security Journal, 9(2), 98-112.
- Wang, Y., & Zhou, L. (2016). Limitations of Current Privacy Frameworks in Distributed Systems. Information Security Journal, 17(4), 400-412.
- White, K., & Zhang, M. (2017). Real-time Data Processing and Privacy Risks. Journal of Distributed Systems, 12(5), 290-305.
- Yu, X., Zhang, Y., & Chen, W. (2017). Blockchain Applications in Secure Data Management. Blockchain Technology Review, 10(3), 202-215.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.