Data Mining and Information Security in Big Data

Authors

  • S. Sathyamoorthy Dept. of Information Technology, Bharathiar University Atrs and Science College, Gudalur, India

Keywords:

Data Mining, Sensitive Information, Privacy-Preserving Data Mining Provenance, Anonymization, Privacy Auction, Antitracking

Abstract

The growing popularity and development of data mining technologies bring serious threat to the security of individual`s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we focus on his privacy and how to protect sensitive information.

 

References

L. BrankovicRE, V. Estivill-Castro, "Privacy issues in knowledge discovery and data mining", in Proc. Austral. Inst.Comput. Ethics Conf., US, pp. 89-99, 1999.

Cynthia Selvi P and Mohamed Shanavas A.R, "Trade-off between Utility and Security using Group Privacy Threshold Sanitization", International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.8-11, 2014.

L. Sweeney, "k-anonymity: A model for protecting privacy", Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol.10, no.5,pp. 557-570, 2002.

Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, Yong Ren, "Information Security in Big Data: Privacy and Data Mining", Access, IEEE , vol.2, no.10, pp.1149,1176, 2014

R. C.-W. Wong and A. W.-C. Fu, "Privacy-preserving data publishing: An overview", Synthesis Lectures Data Manage., vol. 2, no. 1, pp. 1-138, 2010.

J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss", ACM SIGKDD Explorations Newslett., vol. 8, no.2, pp. 21-30, 2006.

Tene and J. Polenetsky, "To track or „do not track‟: Advancing transparency and individual control in online behavioral advertising", Minnesota J. Law, Sci. Technol., Vol.5, no.1, pp. 281- 357, 2012.

M.B. Malik, M.A. Ghazi, R. Ali, "Privacy preserving data mining techniques: Current scenario and future prospects", in Proc. 3rd Int. Conf. Computer Communication Technology, India, pp.26-32, 2012.

S. Matwin, "Privacy-preserving data mining techniques: Survey and challenges", in Discrimination and Privacy in the Information Society, Berlin, pp. 209-221, 2013.

E. Rasmusen, “Games and Information: An Introduction to Game Theory”, Cambridge University, USA, pp.1-347, 1994.

V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata protection", in Secure Data Management in Decentralized Systems. USA, pp.291-321, 2007.

D. C. Parkes, "Iterative combinatorial auctions: Achieving economic and computational efficiency", Ph.D. dissertation of Univeristy Pennsylvania, USA, pp.1-136, 2001.

Downloads

Published

2017-06-30

How to Cite

[1]
S. Sathyamoorthy, “Data Mining and Information Security in Big Data”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 3, pp. 86–91, Jun. 2017.

Issue

Section

Review Article