IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1732191                                                     


Information Security and Data Mining in Big Data

Authors(2):

Tejas P. Adhau, Dr. Mahendra A. Pund
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
The growing popularity and development of data mining technologies bring a serious threat to the security of individual's sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we focus on his privacy and how to protect sensitive information.

Tejas P. Adhau, Dr. Mahendra A. Pund

Data mining, sensitive information, privacy-preserving data mining provenance, anonymization , privacy auction, antitracking.

  1. L. BrankovicRE and V. Estivill-Castro, "Privacy issues in knowledge discovery and data mining," in Proc. Austral. Inst.Comput. Ethics Conf., 1999, pp. 89–99.
  2. C. C. Aggarwal and S. Y. Philip, A General Survey of PrivacyPreserving Data Mining Models and Algorithms. New York,NY, USA: Springer-Verlag, 2008.
  3. L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5,pp. 557–570, 2002.
  4. Verizon Communications Inc. (2013). 2013 Data Breach Investigations Report. Online]. Available: http://www.verizonenterprise.com/resources/reports/rpdatabreachinvestigations-report-2013_en_xg.pdf
  5. Lei Xu; Chunxiao Jiang; Jian Wang; Jian Yuan; Yong Ren, "Information Security in Big Data: Privacy and Data Mining,"Access, IEEE , vol.2, no., pp.1149,1176, 2014
  6. R. C.-W. Wong and A. W.-C. Fu, "Privacy-preserving data publishing: An overview," Synthesis Lectures Data Manage.,vol. 2, no. 1, pp. 1–138, 2010.
  7. J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss," ACM SIGKDD Explorations Newslett., vol. 8, no. 2, pp. 21–30, 2006.
  8. R. Gibbons, A Primer in Game Theory. Hertfordshire, U.K.: Harvester Wheatsheaf, 1992.
  9. Tene and J. Polenetsky, "To track or ‘do not track’: Advancing transparency and individual control in online behavioral advertising," Minnesota J. Law, Sci. Technol., no. 1, pp. 281–357, 2012.
  10. M. B. Malik, M. A. Ghazi, and R. Ali, "Privacy preserving data mining techniques: Current scenario and future prospects,"in Proc. 3rd Int. Conf. Comput. Commun. Technol. (ICCCT), Nov. 2012, pp. 26–32.
  11. S. Matwin, "Privacy-preserving data mining techniques: Survey and challenges," in Discrimination and Privacy in the Information Society. Berlin, Germany: Springer-Verlag, 2013, pp. 209–221.
  12. E. Rasmusen, Games and Information: An Introduction to Game Theory, vol. 2. Cambridge, MA, USA: Blackwell, 1994.
  13. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Microdata protection," in Secure Data Management in Decentralized Systems. New York, NY, USA: Springer-Verlag, 2007, pp. 291–321.
  14. D. C. Parkes, "Iterative combinatorial auctions: Achieving economic and computational efficiency," Ph.D. dissertation,Univ. Pennsylvania, Philadelphia, PA, USA, 2001.

Publication Details

Published in : Volume 3 | Issue 2 | March-April - 2017
Date of Publication Print ISSN Online ISSN
2017-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
661-673 IJSRSET1732191   Technoscience Academy

Cite This Article

Tejas P. Adhau, Dr. Mahendra A. Pund, "Information Security and Data Mining in Big Data", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.661-673, March-April-2017.
URL : http://ijsrset.com/IJSRSET1732191.php