International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 2 | Year 2013 | Article Id. IJCTT-V4I2P129 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I2P129

Data Security and Privacy in Data Mining: Research Issues Preparation


Dileep Kumar Singh, Vishnu Swaroop

Citation :

Dileep Kumar Singh, Vishnu Swaroop, "Data Security and Privacy in Data Mining: Research Issues Preparation," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 2, pp. 194-200, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I2P129

Abstract

Database mining can be defined as the process of mining for implicit, formerly unidentified, and potentially essential information from awfully huge databases by efficient knowledge discovery techniques. The privacy and security of user information have become significant public policy anxieties and these anxieties are receiving increased interest by the both public and government lawmaker and controller, privacy advocates, and the media. In this paper we focuses on key online privacy and security issues and concerns, the role of self-regulation and the user on privacy and security protections, data protection laws, regulatory trends, and the outlook for privacy and security legislation. Naturally such a process may open up new assumption dimensions, detect new invasion patterns, and raises new data security problems. Recent developments in information technology have enabled collection and processing of enormous amount of personal data, such as criminal records, online shopping habits, online banking, credit and medical history, and driving records and almost importantly the government concerned data.

Keywords

Database mining, Database security, Data Privacy, Inferences, Intrusion Detection, Law.

References

[1] Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02- 5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999. 
[2] Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006
[3] Fayyad, U., Piatetsky-Shapiro, G., and Smyth P., “From Data Mining to Knowledge Discovery in Databases,” AI Magazine, American Association for Artificial Intelligence, 1996.
[4] Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc, 2005. 
[5] L. Getoor, C. P. Diehl. “Link mining: a survey”, ACM SIGKDD Explorations, vol. 7, pp. 3-12, 2005.
[6] Fayyad U.M., Piatetsky-Shapiro G., Smyth P. “From Data Mining to KDD : An Overview”, AAAI/MIT Press, 1996.
[7] Han J. et Kamber M., “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, Canada, 2002.
[8] Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999
[9] David Hand, Heikki Mannila, and Padhraic Smyth,” Principles of Data Mining”, MIT Press, Cambridge, MA, 2001.
[10] Peter Cabena, Pablo Hadjinian, Rolf Stadler, JaapVerhees, and Alessandro Zanasi, Discovering Data Mining: From Concept to Implementation, Prentice Hall, Upper Saddle River, NJ, 1998.
[11] Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith, ”Data Mining Architecture for Clustered Environments” , Proceeding PARA '02 Proceedings of the 6th International Conference on Applied Parallel Computing Advanced Scientific Computing, Pages 89-98, SpringerVerlag London, UK ©2002
[12] Clifton, C. and D. Marks, “Security and Privacy Implications of Data Mining”, Proceedings of the ACM SIGMOD Conference Workshop on Research Issues in Data Mining and Knowledge Discovery, Montreal, June 1996.
[13] Z. Ferdousi, A. Maeda, “Unsupervised outlier detection in time series data”, 22nd International Conference on Data Engineering Workshops, pp. 51-56, 2006
[14] Morgenstern, M., “Security and Inference in Multilevel Database and Knowledge Base Systems,” Proceedings of the ACM SIGMOD Conference, San Francisco, CA, June 1987.
[15] S. A. Demurjian and J. E. Dobson, “Database Security IX Status and Prospects Edited by D. L. Spooner ISBN 0 412 72920 2, 1996, pp. 391399.
[16] Lin, T. Y., “Anamoly Detection -- A Soft Computing Approach”, Proceedings in the ACM SIGSAC New Security Paradigm Workshop, Aug 3-5, 1994,44-53.,1994 
[17] Scott W. Ambler, “Challenges with legacy data: Knowing your data enemy is the first step in overcoming it”, Practice Leader, Agile Development, Rational Methods Group, IBM, 01 Jul 2001.
[18] Agrawal, R, and R. Srikant, “Privacy-preserving Data Mining,” Proceedings of the ACM SIGMOD Conference, Dallas, TX, May 2000.
[19] Clifton, C., M. Kantarcioglu and J. Vaidya, “Defining Privacy for Data Mining,” Purdue University, 2002 (see also Next Generation Data Mining Workshop, Baltimore, MD, November 2002.
[20] Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke, “Privacy Preserving Mining of Association Rules,” In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada, July 2002.
[21] Fung B., Wang K., Yu P. ”Top-Down Specialization for Information and Privacy Preservation. ICDE Conference, 2005.
[22] Wang K., Yu P., Chakraborty S., “ Bottom-Up Generalization: A Data Mining Solution to Privacy Protection.”,  ICDM Conference, 2004.