Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 116))

The pervasive impact of business computing has made information technology an indispensable part of daily operations and the key to success for enterprises. Data mining, as one of the IT services most needed by enterprises, has been realized as an important way for discovering knowledge from the data and converting “data rich” to “knowledge rich” so as to assist strategic decision making. The benefits of using data mining for decision making have been demonstrated in various industries and governmental sectors, e.g., banking, insurance, direct-mail marketing, telecommunications, retails, and health care [8,14,22]. Among all the available data mining methods, the discovery of associations between business events or transactions is one of the most commonly used data mining techniques. Association rule mining has been an important application in decision support and marketing strategy [19] for an enterprise.

At the same time, many enterprises have accumulated large amount of data from various channels in today's digitalized age. It is important to make these data available for decision making. Enterprise data mining provides such a technique for the exploration and analysis of data so as to reveal hidden information and knowledge. These processes involve extensive collaborations (e.g., exchange or sharing of business data) across different divisions of an enterprise or even enterprises themselves. However, there is also a security concern of potential risk of exposing privacy (and losing business intelligence) of an enterprise during the practice [20]. This is because either the data or the revealed information may contain the privacy of an enterprise. During the data analysis process, e.g., data mining, data transferring, and data sharing, it involves some elements containing sensitive information from which an adversary can decipher the privacy of an enterprise. Without proper security policy and technology, enterprise privacy could be very vulnerable to security breaches. Therefore, it is urgent and critical to provide solutions to protecting enterprise privacy for data mining in different application scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., A. Evfimievski, and R. Srikant. Information sharing across private databases. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Database, pages 86–97, San Diego, California, 2003.

    Google Scholar 

  2. Agrawal, R., T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Database, pages 207–216, 1993.

    Google Scholar 

  3. Agrawal, R., J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Data Bases (VLDB’02), pages 143–154, Hong Kong, China, August 20–23, 2002.

    Google Scholar 

  4. Agrawal, R., J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proceedings of the ACM SIGMOD ICMD, pages 563–574, 2004.

    Google Scholar 

  5. Agrawal, R. and R. Srikant. Faster algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference on Very Large Data Bases (VLDB’94), pages 487–499, Santiago de Chile, Chile, September 12–15, 1994.

    Google Scholar 

  6. Agrawal, R. and R. Srikant. Privacy preserving data mining. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Database, pages 439–450, Texas, USA, May 16–18, 2000.

    Google Scholar 

  7. Agrawal, S. and J. R. Haritsa. A framework for high-accuracy privacy-preserving mining. In Proceedings of the 21th IEEE International Conference on Data Engineering (ICDE’05), pages 193–204, Tokyo, Japan, 2005.

    Google Scholar 

  8. Apte, C., B. Liu, E. Pednault, and P. Smyth. Business applications of data mining. Communications of the ACM, 45(8):49–53, 2002.

    Article  Google Scholar 

  9. Atallah, M., E. Bertino, A. K. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure limitation of sensitive rules. In Proceedings of the IEEE KDEE, pages 45–52, 1999.

    Google Scholar 

  10. Bertino, E. and I.-N. Fovino. A framework for evaluating privacy preserving data mining algorithms. Data Mining and Knowledge Discovery, 11(2):121–154, 2005.

    Article  MathSciNet  Google Scholar 

  11. Bloom, B. Space time tradeoffs in hash coding with allowable errors. Communications of the ACM, 7(13):422–426, 1970.

    Article  Google Scholar 

  12. Chen, Y.-L., K. Tang, R.-J. Shena, and Y.-H. Hu. Market basket analysis in a multiple store environment. Decision Support Systems, 40(2):339–354, 2005.

    Article  Google Scholar 

  13. Chor, B., O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6):965–982, 1998.

    Article  MATH  MathSciNet  Google Scholar 

  14. Culnan, M.-J. Gaint food and elensys: Looking out for customers or gross privacy invasion? Communications of AIS, 16:317–328, 2005.

    Google Scholar 

  15. Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the 8th ACM SIGKDD KDD 2002, pages 217–228, 2002.

    Google Scholar 

  16. Kantarcıoǧlu, M. and C. Clifton. Privacy preserving distributed mining of association rules on horizontally partitioned data. In Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pages 24–31, 2002.

    Google Scholar 

  17. Kantarcıoǧlu, M., J. Jin, and C. Clifton. When do data mining results violate privacy? In Proceedings of the 10th ACM SIGKDD KDD 2004, pages 599–604, 2004.

    Google Scholar 

  18. Kargupta, H., S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the 3rd IEEE ICDM, pages 99–106, 2003.

    Google Scholar 

  19. Lin, Q.-Y., Y.-L. Chen, J.-S. Chen, and Y.-C. Chen. Mining inter-organizational retailing knowledge for an alliance formed by competitive firms. Information & Management, 40(5):431–442, 2003.

    Article  Google Scholar 

  20. Milne, G.-R. Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy and Marketing, 19:1–6, 2000.

    Article  Google Scholar 

  21. Oliveira, S. and O. Zaiane. Protecting sensitive knowledge by data sanitization. In Proceedings of the 3rd IEEE ICDM, pages 211–218, 2003.

    Google Scholar 

  22. Padmanabhan, B. and A. Tzhilin. On the use of optimization for data mining: Theoretical interactions and eCRM opportunities. Management Science, 49(10):1327–1343, 2003.

    Article  Google Scholar 

  23. Pinkas, B. Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explorations, 4(2):12–19, 2002.

    Article  Google Scholar 

  24. Qiu, L., Y. Li, and X. Wu. An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy. In Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), pages 551–558, Hong Kong, China, December 18–22, 2006.

    Google Scholar 

  25. Qiu, L., Y. Li, and X. Wu. Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowledge and Information Systems: An International Journal, Online first, November 17, 2007.

    Google Scholar 

  26. Qiu, L., K.-L. Ong, and S. M. Lui. Safely outsourcing data mining tasks. In Proceedings of the 5th Australian Data Mining Conference (AusDM 2006), pages 1–8, Sydney, Australia, November 29–30, 2006.

    Google Scholar 

  27. Rayardo, R.-J. and R. Srikant. Technological solutions for protecting privacy. IEEE Computer, 36(9):115–118, 2003.

    Google Scholar 

  28. Rizvi, S. and J. Haritsa. Maintaining data privacy in association rule mining. In Proceedings of VLDB’02, pages 682–693, 2002.

    Google Scholar 

  29. Saygin, Y., V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. Sigmod Record, 30(4):45–54, 2001.

    Article  Google Scholar 

  30. Vaidya, J. and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proceedings of the 8th ACM SIGKDD KDD, pages 639–644, 2002.

    Google Scholar 

  31. Vaidya, J. and C. Clifton. Privacy-preserving data mining: Why, how, and when. IEEE Security and Privacy, 2(6):19–27, 2004.

    Article  Google Scholar 

  32. Yao, A. C.-C. How to generate and exchange secrets. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS’86), pages 162–167, Xi’an, China, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chiew, K. (2008). Data Mining with Privacy Preserving in Industrial Systems. In: Liu, Y., Sun, A., Loh, H.T., Lu, W.F., Lim, EP. (eds) Advances of Computational Intelligence in Industrial Systems. Studies in Computational Intelligence, vol 116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78297-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78297-1_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78296-4

  • Online ISBN: 978-3-540-78297-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics