{"id":"https://openalex.org/W2582948973","doi":"https://doi.org/10.1109/bigdata.2016.7841037","title":"Security and privacy for big data: A systematic literature review","display_name":"Security and privacy for big data: A systematic literature review","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2582948973","doi":"https://doi.org/10.1109/bigdata.2016.7841037","mag":"2582948973"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2016.7841037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2016.7841037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.chalmers.se/publication/245967/file/245967_Fulltext.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068987896","display_name":"Boel Nelson","orcid":"https://orcid.org/0000-0002-9746-4885"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Boel Nelson","raw_affiliation_strings":["Department of Computer Science and Engineering, Chalmers University of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chalmers University of Technology","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085143573","display_name":"Tomas Olovsson","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Tomas Olovsson","raw_affiliation_strings":["Department of Computer Science and Engineering, Chalmers University of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chalmers University of Technology","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068987896"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":9.3116,"has_fulltext":true,"cited_by_count":52,"citation_normalized_percentile":{"value":0.97949199,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3693","last_page":"3702"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.7848986387252808},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.739761471748352},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6020083427429199},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5510469675064087},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.529490053653717},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.47783398628234863},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4727790355682373},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4458009600639343},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33389657735824585},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.15665534138679504},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08377975225448608}],"concepts":[{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.7848986387252808},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.739761471748352},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6020083427429199},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5510469675064087},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.529490053653717},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.47783398628234863},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4727790355682373},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4458009600639343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33389657735824585},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.15665534138679504},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08377975225448608},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/bigdata.2016.7841037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2016.7841037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:research.chalmers.se:245967","is_oa":true,"landing_page_url":"https://research.chalmers.se/en/publication/245967","pdf_url":"https://research.chalmers.se/publication/245967/file/245967_Fulltext.pdf","source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:publications.lib.chalmers.se:245967","is_oa":false,"landing_page_url":"http://publications.lib.chalmers.se/publication/245967-security-and-privacy-for-big-data-a-systematic-literature-review","pdf_url":null,"source":{"id":"https://openalex.org/S4377196470","display_name":"Chalmers Publication Library (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text.Article.Conference.PeerReviewed"},{"id":"pmh:oai:pure.atira.dk:publications/64a42184-d8fb-49a7-aebe-98e2640bac42","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85015167993&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306400063","display_name":"Scopus (Elsevier)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Nelson , B &amp; Olovsson , T 2016 , Security and privacy for big data : A systematic literature review . in R Ak , G Karypis , Y Xia , X T Hu , P S Yu , J Joshi , L Ungar , L Liu , A-H Sato , T Suzumura , S Rachuri , R Govindaraju &amp; W Xu (eds) , Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016 . , 7841037 , Institute of Electrical and Electronics Engineers Inc. , pp. 3693-3702 , 4th IEEE International Conference on Big Data, Big Data 2016 , Washington , United States , 05/12/2016 . https://doi.org/10.1109/BigData.2016.7841037","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:research.chalmers.se:245967","is_oa":true,"landing_page_url":"https://research.chalmers.se/en/publication/245967","pdf_url":"https://research.chalmers.se/publication/245967/file/245967_Fulltext.pdf","source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321030","display_name":"VINNOVA","ror":"https://ror.org/01kd5m353"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2582948973.pdf","grobid_xml":"https://content.openalex.org/works/W2582948973.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W135304835","https://openalex.org/W168548896","https://openalex.org/W771128594","https://openalex.org/W889496518","https://openalex.org/W1576766753","https://openalex.org/W1818923311","https://openalex.org/W1881329684","https://openalex.org/W1909629542","https://openalex.org/W1972920322","https://openalex.org/W1983958448","https://openalex.org/W1990976130","https://openalex.org/W1998232800","https://openalex.org/W1999925610","https://openalex.org/W2009611335","https://openalex.org/W2010916967","https://openalex.org/W2019855535","https://openalex.org/W2025548379","https://openalex.org/W2027090774","https://openalex.org/W2029168769","https://openalex.org/W2063695313","https://openalex.org/W2071511328","https://openalex.org/W2074356711","https://openalex.org/W2078401527","https://openalex.org/W2088073011","https://openalex.org/W2088958550","https://openalex.org/W2096870293","https://openalex.org/W2117239687","https://openalex.org/W2122290076","https://openalex.org/W2125800352","https://openalex.org/W2134167315","https://openalex.org/W2135930857","https://openalex.org/W2136114025","https://openalex.org/W2138744797","https://openalex.org/W2159024459","https://openalex.org/W2159128662","https://openalex.org/W2167421362","https://openalex.org/W2168894761","https://openalex.org/W2234365651","https://openalex.org/W2272113230","https://openalex.org/W2911978475","https://openalex.org/W6606855455","https://openalex.org/W6656565258","https://openalex.org/W6666422678","https://openalex.org/W6684559340","https://openalex.org/W6758947373"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3038106605","https://openalex.org/W4225340788","https://openalex.org/W4312902938","https://openalex.org/W3024522029","https://openalex.org/W1990049675","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W3195097297","https://openalex.org/W2767547659"],"abstract_inverted_index":{"Big":[0],"data":[1,25,38,41,47,73,95,152],"is":[2,27,55,145,239,262],"currently":[3,124],"a":[4,172,213,242],"hot":[5],"research":[6,26,112,123,149,159,252,261],"topic,":[7],"with":[8,135],"four":[9],"million":[10],"hits":[11],"on":[12],"Google":[13],"scholar":[14],"in":[15,188],"October":[16],"2016.":[17],"One":[18],"reason":[19],"for":[20,150,219,253],"the":[21,28,72,80,91,97,155,158,161,195,202,228,231,234,245],"popularity":[22],"of":[23,82,90,99,157,194,204,216,236,244,248],"big":[24,94,114,136,151,205,254],"knowledge":[29],"that":[30,220],"can":[31,42,74],"be":[32,50,63,75],"extracted":[33],"from":[34,154,182],"analyzing":[35],"these":[36,141,168],"large":[37],"sets.":[39],"However,":[40],"contain":[43],"sensitive":[44],"information,":[45],"and":[46,57,96,101,110,118,133,138,147,163,185,197,226,250,256],"must":[48],"therefore":[49],"sufficiently":[51],"protected":[52],"as":[53],"it":[54,60],"stored":[56],"processed.":[58],"Furthermore,":[59,223],"might":[61],"also":[62,211],"required":[64],"to":[65,77,107,121,190,240,257],"provide":[66,191,241],"meaningful,":[67],"proven,":[68],"privacy":[69,111,134,148,164,198,251],"guarantees":[70],"if":[71],"linked":[76],"individuals.":[78],"To":[79,166],"best":[81],"our":[83],"knowledge,":[84],"there":[85],"exists":[86],"no":[87],"systematic":[88,173],"overview":[89,193],"overlap":[92],"between":[93,230],"area":[98],"security":[100,109,132,146,162,196,249],"privacy.":[102],"Consequently,":[103],"this":[104,237],"review":[105,175,238],"aims":[106],"explore":[108,225],"within":[113,160,201],"data,":[115,137,255],"by":[116],"outlining":[117],"providing":[119],"structure":[120],"what":[122],"exists.":[125],"Moreover,":[126],"we":[127,170,178,210,224],"investigate":[128],"which":[129,139],"papers":[130,142,181,217],"connect":[131],"categories":[140],"cover.":[143],"Ultimately,":[144],"different":[153],"rest":[156],"domain?":[165],"answer":[167],"questions,":[169],"perform":[171],"literature":[174],"(SLR),":[176],"where":[177,259],"collect":[179],"recent":[180],"top":[183],"conferences,":[184],"categorize":[186],"them":[187],"order":[189],"an":[192],"topics":[199],"present":[200,212],"context":[203],"data.":[206],"Within":[207],"each":[208],"category":[209],"qualitative":[214],"analysis":[215],"representative":[218],"specific":[221],"area.":[222],"visualize":[227],"relationship":[229],"categories.":[232],"Thus,":[233],"objective":[235],"snapshot":[243],"current":[246],"state":[247],"discover":[258],"further":[260],"required.":[263]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
