Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
In today's competitive scenario in industries, each organization wants huge profit. A Data Warehouse is a place for storage of reservoir of data from the various organizations in the range of hundreds of gigabytes to terabytes in size. During the course of time, large volumes of data are being gathered continuously in the Data Warehouse Server for further mining operations in order to understand the latest trends and patterns in their business organizations which in turn be exploited by them for increasing their business profits. Organizations want to conceal its sensitive data from the Data Mining Server but still have the aim to obtain accurate data mining results. Privacy Preserving Data Mining is one of the important fields in the data security. This paper deals with Object Oriented Modeling of Privacy Preservation framework in which the privacy preserving technique applied at the DataWarehouseServer. Object Oriented Programming is the latest trend in the software industry due to its various features like reusability of software codes, better user interface, enhancing software security by restricting data access, cheaper production, development and maintenance costs and quicker software development. Authors have modeled the entire Privacy Preserving framework through standard UML diagrams such as use case, class diagram, sequence diagram and Activity diagram by using Rational Software Architect tool. This will facilitate the designers and developers to have a better understanding of the functionality of each and every entity associated with the system during analysis and design phase, before actual implementation. This simplifies the complexity of the entire operation and helps its implementation in a time and cost efficient manner.
- R.S.Pressman.2005, Software Engineering A Practitionar Approach, McGraw-Hill International Edition. Google ScholarDigital Library
- A.Kumar and Anil Kumar.Software Engineering.Google Scholar
- W.S.Jawadkar.2009.Software Engineering Principal and Practices, The McGraw-Hill Companies.Google Scholar
- Software Development and Object-Oriented Programming Paradigms. Internet: http://www.buyya.com/java/Chapter1.pdfGoogle Scholar
- D.Bell.2003.UML Basics: An Introduction to Unified Modeling Language. Rational Rose.Google Scholar
- S.L. Pfleeger. 2003.Software Engineering Theory and Practices.2 Edition,Pearson Education Google ScholarDigital Library
- J. Rumbaugh I. Jacobson and G. Booch. 2005. A Unified Modeling Language Reference Manual, 2 Edition.Addition Wisley. Google ScholarDigital Library
- P. Jalote. 2005. An Integrated approach to Software Engineering. Narosa Publishing House. Google ScholarDigital Library
- D.M and S.Shankari.E. 2014. Privacy Preserving Data Mining Techniques-Survey, IEEE.Google Scholar
- G. Li and Y.Wang.2012.The Privacy Preserving Classification method based on Singular Vector Decomposition. The International Arab Journal of Information Technology, Vol-9, No.-6, 529--533.Google Scholar
- W.H.Inmon.2005.Building the DataWarehouse. 4 Edition.Wiley Edition. Google ScholarDigital Library
- O. E. Sheta and A. N. Eldeen. 2013. Technology of using a Data Warehouse to support Decision-Making In Health CaRE. International Journal of Database Management Systems (IJDMS) Vol. 5, No.3,(June 2013),75--86.Google Scholar
- P. R. Krishna. 2000. An Approach to Establish DataWarehouse For Banks in India (May 2000).Google Scholar
- B. Dhawan and A. Gosain. Extending Uml for Multidimensional Modeling in Data Warehouse. International Journal of Computer & Communication Technology, 59--64.Google Scholar
- W. Oueslati and J. Akaichi. 2012. Extending UML for trajectory data warehouses conceptual modeling, International Journal of Advanced Computer Science and Applications, (IJACSA) Vol. 3, No. 11, 7--12. DOI= https://thesai.org/Downloads.Google Scholar
- S. Luján Mora and J. Trujillo. 2004. Physical Modeling of Data Warehouses using UML. In Proceedings of the DOLAP '04, November 12-13, 2004, Washington, DC, USA. ACM, 48--57. Google ScholarDigital Library
- L. Muñoz, J.N. Mazón and J. Trujillo.2009.Measures for ETL Processes Models in Data Warehouses. In Proceedings of MoSE+DQS,ACM, November 6, 2009, Hong Kong, China, 33--36. Google ScholarDigital Library
- K. Alaskar and A. Shaikh. 2009. Object Oriented Data Modeling for Data Warehousing (An Extension of UML approach to study Hajjpilgrim's private tour as a Case Study). International Arab Journal of e-Technology, Vol. 1, No. 2, (June 2009), 37--41.Google Scholar
- R. Villarroel, E. F.Medina and M. Piattini, R. Villarroel. 2006. A UML 2.0/OCL Extension for Designing Secure Data Warehouses. Journal of Research and Practice in Information Technology, Vol. 38, No. 1 (February 2006),31--43.Google Scholar
- J. Trujillo, M. Palomar, J. Gomez and Il-Y. Song. 2001. Designing Data Warehouses with OO Conceptual Models. IEEE.66--75. Google ScholarDigital Library
- V. Stefanov and B. List. 2002. A UML Profile for Modeling Data Warehouse Usage.Google Scholar
- V. Stefanov, B. List, B. Korherr. 2002. Extending UML 2 Activity Diagrams with Business Intelligence ObjectsGoogle Scholar
- R. Jindal and S. Taneja. 2012. Comparative Study of Data WarehouseDesign Approaches: A Survey. International Journal of Database Management Systems (IJDMS) Vol. 4, No. 1, (February2012). 33--45. DOI= 10.5121/ijdms.2012.4104.Google Scholar
- M. S. Farhan, M. E. Marie, L. M. E. and Y. K. Helmy. 2011. An Integrated Conceptual Model for Temporal Data Warehouse Security. Vol. 4, No. 4 (July 2011). Canadian Center of Science and Education,46--57.Google Scholar
Recommendations
(α, k)-anonymous data publishing
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the ...
IMR based Anonymization for Privacy Preservation in Data Mining
KMO '16: Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting SocietyPrivacy Preserving Data Mining (PPDM) is a data mining research area that aims to protect individual's personal information from unsolicited or unauthorized disclosure. Privacy relates to personal information that a person would not wish others to know ...
Distribution-based methods of preserving data privacy in Distributed Spatial Data Warehouse
Both transactional and analytical systems store data which, being accessible to unauthorised persons may result in a privacy violation. This issue has become especially important nowadays, due to more restrictive legislation concerning personal data ...
Comments