The pervasive impact of business computing has made information technology an indispensable part of daily operations and the key to success for enterprises. Data mining, as one of the IT services most needed by enterprises, has been realized as an important way for discovering knowledge from the data and converting “data rich” to “knowledge rich” so as to assist strategic decision making. The benefits of using data mining for decision making have been demonstrated in various industries and governmental sectors, e.g., banking, insurance, direct-mail marketing, telecommunications, retails, and health care [8,14,22]. Among all the available data mining methods, the discovery of associations between business events or transactions is one of the most commonly used data mining techniques. Association rule mining has been an important application in decision support and marketing strategy [19] for an enterprise.
At the same time, many enterprises have accumulated large amount of data from various channels in today's digitalized age. It is important to make these data available for decision making. Enterprise data mining provides such a technique for the exploration and analysis of data so as to reveal hidden information and knowledge. These processes involve extensive collaborations (e.g., exchange or sharing of business data) across different divisions of an enterprise or even enterprises themselves. However, there is also a security concern of potential risk of exposing privacy (and losing business intelligence) of an enterprise during the practice [20]. This is because either the data or the revealed information may contain the privacy of an enterprise. During the data analysis process, e.g., data mining, data transferring, and data sharing, it involves some elements containing sensitive information from which an adversary can decipher the privacy of an enterprise. Without proper security policy and technology, enterprise privacy could be very vulnerable to security breaches. Therefore, it is urgent and critical to provide solutions to protecting enterprise privacy for data mining in different application scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., A. Evfimievski, and R. Srikant. Information sharing across private databases. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Database, pages 86–97, San Diego, California, 2003.
Agrawal, R., T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Database, pages 207–216, 1993.
Agrawal, R., J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Data Bases (VLDB’02), pages 143–154, Hong Kong, China, August 20–23, 2002.
Agrawal, R., J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proceedings of the ACM SIGMOD ICMD, pages 563–574, 2004.
Agrawal, R. and R. Srikant. Faster algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference on Very Large Data Bases (VLDB’94), pages 487–499, Santiago de Chile, Chile, September 12–15, 1994.
Agrawal, R. and R. Srikant. Privacy preserving data mining. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Database, pages 439–450, Texas, USA, May 16–18, 2000.
Agrawal, S. and J. R. Haritsa. A framework for high-accuracy privacy-preserving mining. In Proceedings of the 21th IEEE International Conference on Data Engineering (ICDE’05), pages 193–204, Tokyo, Japan, 2005.
Apte, C., B. Liu, E. Pednault, and P. Smyth. Business applications of data mining. Communications of the ACM, 45(8):49–53, 2002.
Atallah, M., E. Bertino, A. K. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure limitation of sensitive rules. In Proceedings of the IEEE KDEE, pages 45–52, 1999.
Bertino, E. and I.-N. Fovino. A framework for evaluating privacy preserving data mining algorithms. Data Mining and Knowledge Discovery, 11(2):121–154, 2005.
Bloom, B. Space time tradeoffs in hash coding with allowable errors. Communications of the ACM, 7(13):422–426, 1970.
Chen, Y.-L., K. Tang, R.-J. Shena, and Y.-H. Hu. Market basket analysis in a multiple store environment. Decision Support Systems, 40(2):339–354, 2005.
Chor, B., O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6):965–982, 1998.
Culnan, M.-J. Gaint food and elensys: Looking out for customers or gross privacy invasion? Communications of AIS, 16:317–328, 2005.
Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the 8th ACM SIGKDD KDD 2002, pages 217–228, 2002.
Kantarcıoǧlu, M. and C. Clifton. Privacy preserving distributed mining of association rules on horizontally partitioned data. In Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pages 24–31, 2002.
Kantarcıoǧlu, M., J. Jin, and C. Clifton. When do data mining results violate privacy? In Proceedings of the 10th ACM SIGKDD KDD 2004, pages 599–604, 2004.
Kargupta, H., S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the 3rd IEEE ICDM, pages 99–106, 2003.
Lin, Q.-Y., Y.-L. Chen, J.-S. Chen, and Y.-C. Chen. Mining inter-organizational retailing knowledge for an alliance formed by competitive firms. Information & Management, 40(5):431–442, 2003.
Milne, G.-R. Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy and Marketing, 19:1–6, 2000.
Oliveira, S. and O. Zaiane. Protecting sensitive knowledge by data sanitization. In Proceedings of the 3rd IEEE ICDM, pages 211–218, 2003.
Padmanabhan, B. and A. Tzhilin. On the use of optimization for data mining: Theoretical interactions and eCRM opportunities. Management Science, 49(10):1327–1343, 2003.
Pinkas, B. Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explorations, 4(2):12–19, 2002.
Qiu, L., Y. Li, and X. Wu. An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy. In Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), pages 551–558, Hong Kong, China, December 18–22, 2006.
Qiu, L., Y. Li, and X. Wu. Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowledge and Information Systems: An International Journal, Online first, November 17, 2007.
Qiu, L., K.-L. Ong, and S. M. Lui. Safely outsourcing data mining tasks. In Proceedings of the 5th Australian Data Mining Conference (AusDM 2006), pages 1–8, Sydney, Australia, November 29–30, 2006.
Rayardo, R.-J. and R. Srikant. Technological solutions for protecting privacy. IEEE Computer, 36(9):115–118, 2003.
Rizvi, S. and J. Haritsa. Maintaining data privacy in association rule mining. In Proceedings of VLDB’02, pages 682–693, 2002.
Saygin, Y., V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. Sigmod Record, 30(4):45–54, 2001.
Vaidya, J. and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proceedings of the 8th ACM SIGKDD KDD, pages 639–644, 2002.
Vaidya, J. and C. Clifton. Privacy-preserving data mining: Why, how, and when. IEEE Security and Privacy, 2(6):19–27, 2004.
Yao, A. C.-C. How to generate and exchange secrets. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS’86), pages 162–167, Xi’an, China, 1986.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chiew, K. (2008). Data Mining with Privacy Preserving in Industrial Systems. In: Liu, Y., Sun, A., Loh, H.T., Lu, W.F., Lim, EP. (eds) Advances of Computational Intelligence in Industrial Systems. Studies in Computational Intelligence, vol 116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78297-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-78297-1_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78296-4
Online ISBN: 978-3-540-78297-1
eBook Packages: EngineeringEngineering (R0)