IDEAS home Printed from https://ideas.repec.org/a/sae/sagope/v12y2022i2p21582440221096445.html
   My bibliography  Save this article

Privacy Prevention of Big Data Applications: A Systematic Literature Review

Author

Listed:
  • Fatima Rafiq
  • Mazhar Javed Awan
  • Awais Yasin
  • Haitham Nobanee
  • Azlan Mohd Zain
  • Saeed Ali Bahaj

Abstract

This paper focuses on privacy and security concerns in Big Data. This paper also covers the encryption techniques by taking existing methods such as differential privacy, k -anonymity, T -closeness, and L -diversity. Several privacy-preserving techniques have been created to safeguard privacy at various phases of a large data life cycle. The purpose of this work is to offer a comprehensive analysis of the privacy preservation techniques in Big Data, as well as to explain the problems for existing systems. The advanced repository search option was utilized for the search of the following keywords in the search: “Cyber security†OR “Cybercrime†) AND ((“privacy prevention†) OR (“Big Data applications†)). During Internet research, many search engines and digital libraries were utilized to obtain information. The obtained findings were carefully gathered out of which 103 papers from 2,099 were found to gain the best information sources to address the provided study subjects. Hence a systemic review of 32 papers from 103 found in major databases (IEEExplore, SAGE, Science Direct, Springer, and MDPIs) were carried out, showing that the majority of them focus on the privacy prediction of Big Data applications with a contents-based approach and the hybrid, which address the major security challenge and violation of Big Data. We end with a few recommendations for improving the efficiency of Big Data projects and provide secure possible techniques and proposed solutions and model that minimizes privacy violations, showing four different types of data protection violations and the involvement of different entities in reducing their impacts.

Suggested Citation

  • Fatima Rafiq & Mazhar Javed Awan & Awais Yasin & Haitham Nobanee & Azlan Mohd Zain & Saeed Ali Bahaj, 2022. "Privacy Prevention of Big Data Applications: A Systematic Literature Review," SAGE Open, , vol. 12(2), pages 21582440221, May.
  • Handle: RePEc:sae:sagope:v:12:y:2022:i:2:p:21582440221096445
    DOI: 10.1177/21582440221096445
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/21582440221096445
    Download Restriction: no

    File URL: https://libkey.io/10.1177/21582440221096445?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Muhammad Yasir & Sitara Afzal & Khalid Latif & Ghulam Mujtaba Chaudhary & Nazish Yameen Malik & Farhan Shahzad & Oh-young Song, 2020. "An Efficient Deep Learning Based Model to Predict Interest Rate Using Twitter Sentiment," Sustainability, MDPI, vol. 12(4), pages 1-16, February.
    2. Kamran Shaukat & Suhuai Luo & Vijay Varadharajan & Ibrahim A. Hameed & Shan Chen & Dongxi Liu & Jiaming Li, 2020. "Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity," Energies, MDPI, vol. 13(10), pages 1-27, May.
    3. Marc Alier & Maria Jose Casañ Guerrero & Daniel Amo & Charles Severance & David Fonseca, 2021. "Privacy and E-Learning: A Pending Task," Sustainability, MDPI, vol. 13(16), pages 1-17, August.
    4. Ritika Raj Krishna & Aanchal Priyadarshini & Amitkumar V. Jha & Bhargav Appasani & Avireni Srinivasulu & Nicu Bizon, 2021. "State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions," Sustainability, MDPI, vol. 13(16), pages 1-46, August.
    5. Patel, Sandip C. & Graham, James H. & Ralston, Patricia A.S., 2008. "Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements," International Journal of Information Management, Elsevier, vol. 28(6), pages 483-491.
    6. Joseph Kwame Adjei & Samuel Adams & Isaac Kofi Mensah & Peter Ebo Tobbin & Solomon Odei-Appiah, 2020. "Digital Identity Management on Social Media: Exploring the Factors That Influence Personal Information Disclosure on Social Media," Sustainability, MDPI, vol. 12(23), pages 1-17, November.
    7. Jahoon Koo & Giluk Kang & Young-Gab Kim, 2020. "Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges," Sustainability, MDPI, vol. 12(24), pages 1-32, December.
    8. Diana Florea & Silvia Florea, 2020. "Big Data and the Ethical Implications of Data Privacy in Higher Education Research," Sustainability, MDPI, vol. 12(20), pages 1-11, October.
    9. Ashraf Sharif & Saira Hanif Soroya & Shakil Ahmad & Khalid Mahmood, 2021. "Antecedents of Self-Disclosure on Social Networking Sites (SNSs): A Study of Facebook Users," Sustainability, MDPI, vol. 13(3), pages 1-21, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jingsha He & Yue Li & Nafei Zhu, 2023. "A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks," Future Internet, MDPI, vol. 15(3), pages 1-17, February.
    2. Chetna Monga & Deepali Gupta & Devendra Prasad & Sapna Juneja & Ghulam Muhammad & Zulfiqar Ali, 2022. "Sustainable Network by Enhancing Attribute-Based Selection Mechanism Using Lagrange Interpolation," Sustainability, MDPI, vol. 14(10), pages 1-15, May.
    3. Pedro Malo-Perisé & José Merseguer, 2022. "The “Socialized Architecture”: A Software Engineering Approach for a New Cloud," Sustainability, MDPI, vol. 14(4), pages 1-20, February.
    4. Hail Jung & Jinsu Jeon & Dahui Choi & Jung-Ywn Park, 2021. "Application of Machine Learning Techniques in Injection Molding Quality Prediction: Implications on Sustainable Manufacturing Industry," Sustainability, MDPI, vol. 13(8), pages 1-16, April.
    5. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    6. Ge, Futing & Zhang, Weiguo, 2022. "The determinants of cross-border bond risk premia," Journal of International Financial Markets, Institutions and Money, Elsevier, vol. 81(C).
    7. Wojciech Szczepanik & Marcin Niemiec, 2022. "Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis," Energies, MDPI, vol. 15(11), pages 1-19, May.
    8. Feng Wu & Wanqiang Xu & Chaoran Lin & Yanwei Zhang, 2022. "Knowledge Trajectories on Public Crisis Management Research from Massive Literature Text Using Topic-Clustered Evolution Extraction," Mathematics, MDPI, vol. 10(12), pages 1-18, June.
    9. Changhee Lee & Yulseong Kim & Youngran Shin, 2021. "Data Usage and the Legal Stability of Transactions for the Commercial Operation of Autonomous Vessels Based on Digital Ownership in Korean Civil Law," Sustainability, MDPI, vol. 13(15), pages 1-18, July.
    10. Henri Teittinen & Markku Kaperi, 2022. "Exploring dishonest vulnerability in digital finance platforms ? an actor?network theory approach," International Journal of Business and Management, International Institute of Social and Economic Sciences, vol. 10(2), pages 67-79, November.
    11. Seungjin Baek & Young-Gab Kim, 2021. "C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment," Sustainability, MDPI, vol. 13(24), pages 1-19, December.
    12. Ahmed Abdu & Zhengjun Zhai & Redhwan Algabri & Hakim A. Abdo & Kotiba Hamad & Mugahed A. Al-antari, 2022. "Deep Learning-Based Software Defect Prediction via Semantic Key Features of Source Code—Systematic Survey," Mathematics, MDPI, vol. 10(17), pages 1-26, August.
    13. Doherty, Neil Francis & Anastasakis, Leonidas & Fulford, Heather, 2011. "Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy," International Journal of Information Management, Elsevier, vol. 31(3), pages 201-209.
    14. Henriques de Gusmão, Ana Paula & Mendonça Silva, Maisa & Poleto, Thiago & Camara e Silva, Lúcio & Cabral Seixas Costa, Ana Paula, 2018. "Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory," International Journal of Information Management, Elsevier, vol. 43(C), pages 248-260.
    15. Ebrahim A. A. Ghaleb & P. D. D. Dominic & Suliman Mohamed Fati & Amgad Muneer & Rao Faizan Ali, 2021. "The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees," Sustainability, MDPI, vol. 13(15), pages 1-33, July.
    16. Najmul Hoda & Naim Ahmad & Amjad Aldweesh & Quadri Noorulhasan Naveed, 2023. "Intensity of SNS Use as a Predictor of Online Social Capital and the Moderating Role of SNS Platforms: An Empirical Study Using Partial Least Squares Structural Equation Modelling," Sustainability, MDPI, vol. 15(6), pages 1-17, March.
    17. Bhargav Appasani & Sunil Kumar Mishra & Amitkumar V. Jha & Santosh Kumar Mishra & Florentina Magda Enescu & Ioan Sorin Sorlei & Fernando Georgel Bîrleanu & Noureddine Takorabet & Phatiphat Thounthong , 2022. "Blockchain-Enabled Smart Grid Applications: Architecture, Challenges, and Solutions," Sustainability, MDPI, vol. 14(14), pages 1-33, July.
    18. Pengyi Liao & Jun Yan & Jean Michel Sellier & Yongxuan Zhang, 2022. "TADA: A Transferable Domain-Adversarial Training for Smart Grid Intrusion Detection Based on Ensemble Divergence Metrics and Spatiotemporal Features," Energies, MDPI, vol. 15(23), pages 1-18, November.
    19. Silva, Maisa Mendonça & de Gusmão, Ana Paula Henriques & Poleto, Thiago & Silva, Lúcio Camara e & Costa, Ana Paula Cabral Seixas, 2014. "A multidimensional approach to information security risk management using FMEA and fuzzy theory," International Journal of Information Management, Elsevier, vol. 34(6), pages 733-740.
    20. Nasir, Nida & Kansal, Afreen & Alshaltone, Omar & Barneih, Feras & Shanableh, Abdallah & Al-Shabi, Mohammad & Al Shammaa, Ahmed, 2023. "Deep learning detection of types of water-bodies using optical variables and ensembling," LSE Research Online Documents on Economics 118724, London School of Economics and Political Science, LSE Library.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:sagope:v:12:y:2022:i:2:p:21582440221096445. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.