Skip to main content

A Privacy Preserving Framework for Big Data in e-Government Environments

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9264))

Abstract

Big data is widely considered as the next big trend in e-Government environments but at the same time one of the most emerging and critical issues due to the challenges it imposes. The large amount of data being retained by governmental Service Providers that can be (potentially) exploited during Data Mining and analytics processes, include personal data and personally identifiable information, raising privacy concerns, mostly regarding data minimization and purpose limitation. This paper addresses the consideration of Central Government to aggregate information without revealing personal identifiers of individuals and proposes a privacy preserving methodology that can be easily incorporated into already deployed electronic services and e-Government frameworks through the adoption of scalable and adaptable salted hashing techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This work has been supported by the national project “Secure and Privacy-Aware eGovernment Sevices – SPAGOS” (Grant Agreement 11SYN_9_2059), under “SYNERGAGIA 2011” programme, of the Operational programme “Competitiveness and Entrepreneurship”.

References

  1. Tene, O., Polonetsky, J.: Big Data for All: Privacy and User Control in the Age of Analytics, 239–272 (2013)

    Google Scholar 

  2. Kim, G., Trimi, S., Chung, J.: Big-data applications in the government sector. ACM Commun. 57(3), 78–85 (2014)

    Article  Google Scholar 

  3. Morabito, V.: Big Data and Analytics, 1st edn. Springer International Publishing, Switzerland (2015)

    Google Scholar 

  4. Bargh, M., Meijer, R., Choenni, S., Conradie, P.: Privacy protection in data sharing: towards feedback based solutions. In: Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, Guimarães, Portugal, pp. 28–36 (2014)

    Google Scholar 

  5. Xindong, W., Xingquan, Z., Gong-Qing, W., Wei, D.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97–107 (2014)

    Article  Google Scholar 

  6. Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. Netw. IEEE 28, 46–50 (2014)

    Article  Google Scholar 

  7. Ganesh, D., Mahendran, S.: Security in data mining using user role based methodology. Int. J. Emerg. Trends Comput. Commun. Technol. 1(2), 83–92 (2014)

    Google Scholar 

  8. Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C., Mitrou, L.: Towards an enhanced authentication framework for egovernment services: the greek case. In: Ferro, E., Scholl, J., Wimmer, M. (eds.) EGOV 20008 7th International Conference on Electronic Government, Torino, Italy, Trauner Verlag, vol. 1, pp.189–196 (2008)

    Google Scholar 

  9. Venkatasubramanian, S.: Measures of Anonymity. In: Aggarwal, C.C., Yu, P.S. (ed.) Privacy-Preserving Data Mining 1st edn. 34. Springer, Heidelberg (2008)

    Google Scholar 

  10. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Bélanger, F., Crossler, R.: Privacy in the digital age: a review of information privacy research in information systems, 1017–1042 (2011)

    Google Scholar 

  12. Brankovic, L., Estivil-Castro, E.: Privacy issues in knowledge discovery and data mining. In: Ustralian Institute of Computer Ethics Conference (AICEC 1999), Australia, pp. 89–99 (1999)

    Google Scholar 

  13. Kelsey, J., Schneie, B., Hall, C., Wagner, D.: Secure applications of low-entropy keys. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 121–134. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Aggarwal, C., Yu, S.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy Preserving Data Mining, pp. 11–52. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Verykios, V., Bertino, E., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Rec. 33, 50–57 (2004)

    Article  Google Scholar 

  16. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: International Conference on Management of Data (SIGMOD), Dallas, Texas, pp. 439–450 (2000)

    Google Scholar 

  17. Agrawal, D., Aggarwal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Aggarwal, C.C., Yu, P.S. (ed.) IGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247–255

    Google Scholar 

  18. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prokopios Drogkaris .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Drogkaris, P., Gritzalis, A. (2015). A Privacy Preserving Framework for Big Data in e-Government Environments. In: Fischer-Hübner, S., Lambrinoudakis, C., López, J. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2015. Lecture Notes in Computer Science(), vol 9264. Springer, Cham. https://doi.org/10.1007/978-3-319-22906-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22906-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22905-8

  • Online ISBN: 978-3-319-22906-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics