Data Security and Privacy Research Trends: LDA Topic Modeling
Journal: Architecture Engineering and Science DOI: 10.32629/aes.v6i3.4374
Abstract
With the rapid advancement of big data technologies, the need for robust data security and privacy measures has intensified. Big data technologies have revolutionized the collection and analysis of a vast volume of research literature, offering unparalleled avenues for scholarly inquiry. Identifying prevalent research topics and discerning developmental trends is paramount, especially when grounded in an expansive literature base. This study examined abstracts and author keywords from 4,311 pertinent articles published between 1980 and 2023, sourced from the Web of Science core collection. The content of abstracts and author keywords underwent LDA theme modeling analysis. Consequently, two predominant research topics emerged: security and privacy measures for mobile applications and ensuring security and information integrity for big data within the Internet of Things framework. The LDA model proficiently pinpoints these salient topics, assisting researchers in comprehending the current state of the domain and guiding potential future research trajectories.
Keywords
data security; privacy; LDA topic modeling; topic trends; word cloud.
Full Text
PDF - Viewed/Downloaded: 1 TimesReferences
[1]Saxena, V. K., & Pushkar, S. (2014, Mar 08-09). Privacy Preserving Model in Cloud Environment. Paper presented at the Conference on IT in Business, Industry and Government (CSIBIG), Sri Aurobindo Inst Technol, Indore, INDIA.
[2]Sun, Z. C., Wang, Y. J., Cai, Z. P., Liu, T. E., Tong, X. R., & Jiang, N. (2021). A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing. International Journal of Intelligent Systems, 36(5), 2058-2080.
[3]Bertino, E. (2016, Jun 10-14). Data Security and Privacy Concepts, Approaches, and Research Directions. Paper presented at the 40th Annual IEEE Computer Software and Applications Conference Symposium (COMPSAC) / Symposium on Software Engineering Technology and Applications (SETA), Atlanta, GA.
[4]Zhang, J. L., Chen, B., Zhao, Y. C., Cheng, X., & Hu, F. (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. Ieee Access, 6, 18209-18237.
[5]Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada, 5, 12
[6]Yang, P., Xiong, N. X., & Ren, J. L. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. Ieee Access, 8, 131723-131740.
[7]Huang, L. S., Chen, H. P., Wang, X., & Chen, G. L. (2000). A fast algorithm for mining association rules. Journal of Computer Science and Technology, 15(6), 619-624.
[8]Arzt, S., et al. (2014). FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Acm Sigplan Notices, 49(6), 259-269.http://dx.doi.org/10.1145/2666356.2594299
[9]Perera, C., Ranjan, R., Wang, L. Z., Khan, S. U., & Zomaya, A. Y. (2015). Big Data Privacy in the Internet of Things Era. It Professional, 17(3), 32-39.
[10]Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28.
[2]Sun, Z. C., Wang, Y. J., Cai, Z. P., Liu, T. E., Tong, X. R., & Jiang, N. (2021). A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing. International Journal of Intelligent Systems, 36(5), 2058-2080.
[3]Bertino, E. (2016, Jun 10-14). Data Security and Privacy Concepts, Approaches, and Research Directions. Paper presented at the 40th Annual IEEE Computer Software and Applications Conference Symposium (COMPSAC) / Symposium on Software Engineering Technology and Applications (SETA), Atlanta, GA.
[4]Zhang, J. L., Chen, B., Zhao, Y. C., Cheng, X., & Hu, F. (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. Ieee Access, 6, 18209-18237.
[5]Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada, 5, 12
[6]Yang, P., Xiong, N. X., & Ren, J. L. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. Ieee Access, 8, 131723-131740.
[7]Huang, L. S., Chen, H. P., Wang, X., & Chen, G. L. (2000). A fast algorithm for mining association rules. Journal of Computer Science and Technology, 15(6), 619-624.
[8]Arzt, S., et al. (2014). FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Acm Sigplan Notices, 49(6), 259-269.http://dx.doi.org/10.1145/2666356.2594299
[9]Perera, C., Ranjan, R., Wang, L. Z., Khan, S. U., & Zomaya, A. Y. (2015). Big Data Privacy in the Internet of Things Era. It Professional, 17(3), 32-39.
[10]Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28.
Copyright © 2025 Bin Zhao, Jie Zhou
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
