Full Paper View Go Back

Data Mining and Information Security in Big Data

S. Sathyamoorthy1

  1. Dept. of Information Technology, Bharathiar University Atrs and Science College, Gudalur, India.

Section:Review Paper, Product Type: Isroset-Journal
Vol.5 , Issue.3 , pp.86-91, Jun-2017


Online published on Jun 30, 2017


Copyright © S. Sathyamoorthy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Sathyamoorthy, “Data Mining and Information Security in Big Data,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.86-91, 2017.

MLA Style Citation: S. Sathyamoorthy "Data Mining and Information Security in Big Data." International Journal of Scientific Research in Computer Science and Engineering 5.3 (2017): 86-91.

APA Style Citation: S. Sathyamoorthy, (2017). Data Mining and Information Security in Big Data. International Journal of Scientific Research in Computer Science and Engineering, 5(3), 86-91.

BibTex Style Citation:
@article{Sathyamoorthy_2017,
author = {S. Sathyamoorthy},
title = {Data Mining and Information Security in Big Data},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {86-91},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=396},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=396
TI - Data Mining and Information Security in Big Data
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - S. Sathyamoorthy
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 86-91
IS - 3
VL - 5
SN - 2347-2693
ER -

686 Views    218 Downloads    237 Downloads
  
  

Abstract :
The growing popularity and development of data mining technologies bring serious threat to the security of individual`s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we focus on his privacy and how to protect sensitive information.

Key-Words / Index Term :
Data Mining, Sensitive Information, Privacy-Preserving Data Mining Provenance, Anonymization , Privacy Auction, Antitracking

References :
[1]. L. BrankovicRE, V. Estivill-Castro, "Privacy issues in knowledge discovery and data mining", in Proc. Austral. Inst.Comput. Ethics Conf., US, pp. 89-99, 1999.
[2]. Cynthia Selvi P and Mohamed Shanavas A.R, "Trade-off between Utility and Security using Group Privacy Threshold Sanitization", International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.8-11, 2014.
[3]. L. Sweeney, "k-anonymity: A model for protecting privacy", Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol.10, no.5,pp. 557-570, 2002.
[4]. Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, Yong Ren, "Information Security in Big Data: Privacy and Data Mining", Access, IEEE , vol.2, no.10, pp.1149,1176, 2014

[5]. R. C.-W. Wong and A. W.-C. Fu, "Privacy-preserving data publishing: An overview", Synthesis Lectures Data Manage., vol. 2, no. 1, pp. 1-138, 2010.

[6]. J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss", ACM SIGKDD Explorations Newslett., vol. 8, no.2, pp. 21-30, 2006.


[7]. Tene and J. Polenetsky, "To track or „do not track‟: Advancing transparency and individual control in online behavioral advertising", Minnesota J. Law, Sci. Technol., Vol.5, no.1, pp. 281- 357, 2012.
[8]. M.B. Malik, M.A. Ghazi, R. Ali, "Privacy preserving data mining techniques: Current scenario and future prospects", in Proc. 3rd Int. Conf. Computer Communication Technology, India, pp.26-32, 2012.

[11]. S. Matwin, "Privacy-preserving data mining techniques: Survey and challenges", in Discrimination and Privacy in the Information Society, Berlin, pp. 209-221, 2013.

[12]. E. Rasmusen, “Games and Information: An Introduction to Game Theory”, Cambridge University, USA, pp.1-347, 1994.

[13]. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata protection", in Secure Data Management in Decentralized Systems. USA, pp.291-321, 2007.

[14]. D. C. Parkes, "Iterative combinatorial auctions: Achieving economic and computational efficiency", Ph.D. dissertation of Univeristy Pennsylvania, USA, pp.1-136, 2001.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation