@article {ElOuazzani2020142, title = {A classification of non-cryptographic anonymization techniques ensuring privacy in big data}, journal = {International Journal of Communication Networks and Information Security}, volume = {12}, number = {1}, year = {2020}, note = {cited By 6}, pages = {142-152}, abstract = {Recently, Big Data processing becomes crucial to most enterprise and government applications due to the fast growth of the collected data. However, this data often includes private personal information that arise new security and privacy concerns. Moreover, it is widely agreed that the sheer scale of big data makes many privacy preserving techniques unavailing. Therefore, in order to ensure privacy in big data, anonymization is suggested as one of the most efficient approaches. In this paper, we will provide a new detailed classification of the most used non-cryptographic anonymization techniques related to big data including generalization and randomization approaches. Besides, the paper evaluates the presented techniques through integrity, confidentiality and credibility criteria. In addition, three relevant anonymization techniques including k-anonymity, l-diversity and t-closeness are tested on an extract of a huge real data set. {\textcopyright} 2020, Kohat University of Science and Technology.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087292674\&partnerID=40\&md5=785b0ce48df310cdcdd67ad945490264}, author = {El Ouazzani, Z. and El Bakkali, H.} } @article {Boughrous2018361, title = {A comparative study on access control models and security requirements in workflow systems}, journal = {Advances in Intelligent Systems and Computing}, volume = {735}, year = {2018}, pages = {361-373}, doi = {10.1007/978-3-319-76354-5_33}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044028585\&doi=10.1007\%2f978-3-319-76354-5_33\&partnerID=40\&md5=851681ec1b732c7bb36870825ef48643}, author = {Boughrous, M. and El Bakkali, H.} }