Information Security and Data Mining in Big Data

Authors

  • Tejas P. Adhau  Department of Computer Science of Engineering/SGBAU University/PRMIT Badnera/Amravati, Maharashtra, India
  • Dr. Mahendra A. Pund  Department of Computer Science of Engineering/SGBAU University/PRMIT Badnera/Amravati, Maharashtra, India

Keywords:

Data mining, sensitive information, privacy-preserving data mining provenance, anonymization , privacy auction, antitracking.

Abstract

The growing popularity and development of data mining technologies bring a serious threat to the security of individual's sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we focus on his privacy and how to protect sensitive information.

References

  1. L. BrankovicRE and V. Estivill-Castro, "Privacy issues in knowledge discovery and data mining," in Proc. Austral. Inst.Comput. Ethics Conf., 1999, pp. 89–99.
  2. C. C. Aggarwal and S. Y. Philip, A General Survey of PrivacyPreserving Data Mining Models and Algorithms. New York,NY, USA: Springer-Verlag, 2008.
  3. L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5,pp. 557–570, 2002.
  4. Verizon Communications Inc. (2013). 2013 Data Breach Investigations Report. Online]. Available: http://www.verizonenterprise.com/resources/reports/rpdatabreachinvestigations-report-2013_en_xg.pdf
  5. Lei Xu; Chunxiao Jiang; Jian Wang; Jian Yuan; Yong Ren, "Information Security in Big Data: Privacy and Data Mining,"Access, IEEE , vol.2, no., pp.1149,1176, 2014
  6. R. C.-W. Wong and A. W.-C. Fu, "Privacy-preserving data publishing: An overview," Synthesis Lectures Data Manage.,vol. 2, no. 1, pp. 1–138, 2010.
  7. J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss," ACM SIGKDD Explorations Newslett., vol. 8, no. 2, pp. 21–30, 2006.
  8. R. Gibbons, A Primer in Game Theory. Hertfordshire, U.K.: Harvester Wheatsheaf, 1992.
  9. Tene and J. Polenetsky, "To track or ‘do not track’: Advancing transparency and individual control in online behavioral advertising," Minnesota J. Law, Sci. Technol., no. 1, pp. 281–357, 2012.
  10. M. B. Malik, M. A. Ghazi, and R. Ali, "Privacy preserving data mining techniques: Current scenario and future prospects,"in Proc. 3rd Int. Conf. Comput. Commun. Technol. (ICCCT), Nov. 2012, pp. 26–32.
  11. S. Matwin, "Privacy-preserving data mining techniques: Survey and challenges," in Discrimination and Privacy in the Information Society. Berlin, Germany: Springer-Verlag, 2013, pp. 209–221.
  12. E. Rasmusen, Games and Information: An Introduction to Game Theory, vol. 2. Cambridge, MA, USA: Blackwell, 1994.
  13. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Microdata protection," in Secure Data Management in Decentralized Systems. New York, NY, USA: Springer-Verlag, 2007, pp. 291–321.
  14. D. C. Parkes, "Iterative combinatorial auctions: Achieving economic and computational efficiency," Ph.D. dissertation,Univ. Pennsylvania, Philadelphia, PA, USA, 2001.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Tejas P. Adhau, Dr. Mahendra A. Pund, " Information Security and Data Mining in Big Data, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.661-673, March-April-2017.