Privacy preserving algorithms and techniques for distributed system : A review

D V Tungar, D. V. Patil

Abstract


The fast development in data collection, storage, and transmission has raised awareness of the potential risks connected with illegal access, data breaches, and personal information misuse [1]. It has raised concerns about data security and privacy. A number of high-profile events have highlighted the serious ramifications of exposed data, ranging from financial losses to identity theft and reputational harm. Individuals, companies, and governments are about protecting sensitive data, which includes personal identifiers, financial records, and private documents. As technology advances and data becomes a more valuable asset, the need for strong safeguards against illegal access, interception, and manipulation grows. Obtaining good data security and privacy is a complicated task that necessitates comprehensive methods, such as the use of sophisticated encryption techniques and strict adherence to privacy legislation and best practices [2]. In this paper a various techniques and issues in privacy preservation are reviewed

References


A. Ali, A. W. Septyanto, I. Chaudhary, H.

Al Hamadi, H. M. Alzoubi, and Z. F.

Khan, “Applied Artificial Intelligence as

Event Horizon Of Cyber Security,” in

IJETT ISSN: 2350 – 0808 | September 2023 | Volume 10 | Issue 2 |

International Conference on Business

Analytics for Technology and Security,

ICBATS 2022, 2022.

A. A. Mughal, “Cybersecurity Hygiene in

the Era of Internet of Things (IoT): Best

Practices and Challenges,” Appl. Res.

Artif. Intell. Cloud Comput., vol. 2, no. 1,

pp. 1–Accessed: May 30, 2023. [Online].

S. Morrison-Smith and J. Ruiz,

“Challenges and barriers in virtual teams: a

literature review,” SN Appl. Sci., vol. 2,

no. 6, Jun. 2020.

A. Iosup et al., “The atlarge vision on the

design of distributed systems and

ecosystems,” in Proceedings - International

Conference on Distributed Computing

Systems, 2019, pp. 1765–1776.

S.-F. Tu et al., “Revealing the Barriers of

Blockchain Technology for Supply Chain

Transparency and Sustainability in the

Construction Industry: An Application of

Pythagorean FAHP Methods,” Sustain.

, Vol. 15, Page 10681, vol. 15, no. 13,

p. 10681, Jul. 2023.

A. K. Tyagi, M. M. Nair, S. Niladhuri, and

A. Abraham, “Security, Privacy Research

issues in Various Computing Platforms : A

Survey and the Road Ahead,” J. Inf. Assur.

Secur., vol. 15, pp. 1–16, 2020, Accessed:

Jul. 24, 2023. [Online]. Available:

https://ak-tyagi.com/static/pdf/6.pdf

C. Zhang and Y. Wang, “Enabling

Privacy-Preservation in Decentralized

Optimization,” IEEE Trans. Control Netw.

Syst., vol. 6, no. 2, pp. 679–689, 2019.

Y. Lu and M. Zhu, “Privacy preserving

distributed optimization using

homomorphic encryption,” Automatica,

vol. 96, pp. 314–325, 2018, doi:

1016/j.automatica.2018.07.005.

E. Nozari, P. Tallapragada, and J. Cortes,

“Differentially Private Distributed Convex

Optimization via Functional Perturbation,”

IEEE Trans. Control Netw. Syst., vol. 5,

no. 1, pp. 395–408, 2018.

S. Han, U. Topcu, and G. J. Pappas,

“Differentially Private Distributed

Constrained Optimization,” IEEE Trans.

Automat. Contr., vol. 62, no. 1, pp. 50–64,

S. Gade and N. H. Vaidya, “PrivacyPreserving Distributed Learning via

Obfuscated Stochastic Gradients,” in

Proceedings of the IEEE Conference on

Decision and Control, 2018, pp. 184–191.

T. W. K. Mak, F. Fioretto, and P. Van

Hentenryck, “Privacy-preserving

obfuscation for distributed power

systems,” Electr. Power Syst. Res., vol.

, 2020.

J. Okwuibe, M. Liyanage, I. Ahmad, and

M. Ylianttila, “Cloud and MEC security,”

in A Comprehensive Guide to 5G Security,

wiley, 2018, pp. 373–397.

Y. Liu, W. Guo, C. I. Fan, L. Chang, and

C. Cheng, “A Practical Privacy-Preserving

Data Aggregation (3PDA) Scheme for

Smart Grid,” IEEE Trans. Ind. Informatics,

vol. 15, no. 3, pp. 1767–1774, 2019.

K. El Emam, L. Mosquera, and J. Bass,

“Evaluating identity disclosure risk in fully

synthetic health data: model development

and validation,” J. Med. Internet Res., vol.

, no. 11, 2020.

E. Nicol et al., “Revealing Cumulative

Risks in Online Personal Information: A

Data Narrative Study,” Proc. ACM

Human-Computer Interact., vol. 6, no.

CSCW2, p. 25, Nov. 2022.

A. Latenko, M. S. Bargh, S. Van Den

Braak, and M. Vink, “A review of

Frequency Table Disclosure Control from

a Microdata Perspective,” in ICDS 2020 :

The Fourteenth International Conference

on Digital Society, 2020. Accessed: Jul.

, 2023. [Online].

K. Spiller et al., “Data privacy: Users’

thoughts on quantified self personal data,”

in Self-Tracking: Empirical and

Philosophical Investigations, Springer

IJETT ISSN: 2350 – 0808 | September 2023 | Volume 10 | Issue 2 |

International Publishing, 2017, pp. 111–

X. Wang, S. Garg, H. Lin, G. Kaddoum, J.

Hu, and M. S. Hossain, “A Secure Data

Aggregation Strategy in Edge Computing

and Blockchain-Empowered Internet of

Things,” IEEE Internet Things J., vol. 9,

no. 16, pp. 14237–14246, 2022.

J. Zhang, B. Chen, Y. Zhao, X. Cheng,

and F. Hu, “Data Security and PrivacyPreserving in Edge Computing Paradigm:

Survey and Open Issues,” IEEE Access,

vol. 6, pp. 18209–18237, 2018.

D. Ghelani et al., “Cyber Security Threats,

Vulnerabilities, and Security Solutions

Models in Banking,” Am. J. Comput. Sci.

Technol., vol. x, No. x, pp. x–x, 2022.

A. Tandon and P. Srivastava, “Trust-based

Enhanced Secure Routing against Rank

and Sybil Attacks in IoT,” in 2019 Twelfth

International Conference on Contemporary

Computing (IC3), IEEE, Aug. 2019, pp. 1–

T. Orekondy, S. J. Oh, Y. Zhang, B.

Schiele, and M. Fritz, “Gradient-Leaks:

Understanding and Controlling

Deanonymization in Federated Learning,”

arXiv Prepr. arxiv.org/pdf/1805.05838.pdf,

May 2018, Accessed: Oct. 20, 2023.

[Online].

P. Zhao, H. Huang, X. Zhao, and D.

Huang, “P3: Privacy-Preserving Scheme

against Poisoning Attacks in Mobile-Edge

Computing,” IEEE Trans. Comput. Soc.

Syst., vol. 7, no. 3, pp. 818–826, 2020.

J. Y. A. Elreesh and S. S. Abu-Naser,

“Cloud Network Security Based on

Biometrics Cryptography Intelligent

Tutoring System,” vol. 3, no. 3, pp. 37–70,

, Accessed: Jul. 24, 2023. [Online].

M. K. Hasan et al., “Lightweight

Cryptographic Algorithms for Guessing

Attack Protection in Complex Internet of

Things Applications,” Complexity, 2021.

O. G. Abood and S. K. Guirguis, “A

Survey on Cryptography Algorithms,” Int.

J. Sci. Res. Publ., vol. 8, no. 7, pp. 495–

, 2018.

C. Riman and P. E. Abi-Char,

“Comparative Analysis of Block CipherBased Encryption Algorithms: A Survey,”

Comput. Fraud, vol. 3, no. 1, pp. 1–7,

P. Dixit, A. K. Gupta, M. C. Trivedi, and

V. K. Yadav, “Traditional and hybrid

encryption techniques: A survey,” Netw.

Commun. Data Knowl. Eng. Springer

Singapore, vol. 2, pp. 239–248, 2018.

M. Blanton, A. Kang, and C. Yuan,

“Improved Building Blocks for Secure

Multi-party Computation Based on Secret

Sharing with Honest Majority,” in Lecture

Notes in Computer Science (including

subseries Lecture Notes in Artificial

Intelligence and Lecture Notes in

Bioinformatics), 2020, pp. 377–397.

D. H. Vu, T. D. Luong, and T. B. Ho, “An

efficient approach for secure multi-party

computation without authenticated

channel,” Inf. Sci. (Ny)., vol. 527, pp.

–368, 2020.

N. Kaaniche, M. Laurent, and S. Belguith,

“Privacy enhancing technologies for

solving the privacy-personalization

paradox: Taxonomy and survey,” Journal

of Network and Computer Applications,

vol. 171. Academic Press, p. 102807, Dec.

, 2020.

S. Murthy, A. Abu Bakar, F. Abdul

Rahim, and R. Ramli, “A Comparative

Study of Data Anonymization

Techniques,” in Proceedings - 5th IEEE

International Conference on Big Data

Security on Cloud, BigDataSecurity 2019,

th IEEE International Conference on

High Performance and Smart Computing,

HPSC 2019 and 4th IEEE International

Conference on Intelligent Data and Securit,

IEEE, May 2019, pp. 306–309.

B. Ojokoh and E. Adebisi, “A review of

question answering systems,” J. Web Eng.,

vol. 17, no. 8, pp. 717–758, 2019.

IJETT ISSN: 2350 – 0808 | September 2023 | Volume 10 | Issue 2 |

G. M. Biancofiore, Y. Deldjoo, T. Di

Noia, E. Di Sciascio, and F. Narducci,

“Interactive Question Answering Systems:

Literature Review,” arxiv.org, Sep. 2022,

Accessed: May 31, 2023. [Online].

J. Li, X. Kuang, S. Lin, X. Ma, and Y.

Tang, “Privacy preservation for machine

learning training and classification based

on homomorphic encryption schemes,” Inf.

Sci. (Ny)., vol. 526, pp. 166–179, 2020.

A. Meryem, D. Samira, and E. O.

Bouabid, “Enhancing cloud security using

advanced MapReduce k-means on log

files,” ACM Int. Conf. Proceeding Ser., pp.

–67, Jan. 2018.

X. Zhao and W. Zhang, “An anomaly

intrusion detection method based on

improved K-means of cloud computing,”

in Proceedings - 2016 6th International

Conference on Instrumentation and

Measurement, Computer, Communication

and Control, IMCCC 2016, 2016, pp. 284–

M. A. Zardari, L. T. Jung, and N. Zakaria,

“K-NN classifier for data confidentiality in

cloud computing,” in 2014 International

Conference on Computer and Information

Sciences, ICCOINS 2014 - A Conference

of World Engineering, Science and

Technology Congress, ESTCON 2014 -

Proceedings, 2014.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology