Reference Hub23
Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases

Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases

Rick L. Wilson, Peter A. Rosen
Copyright: © 2003 |Volume: 14 |Issue: 2 |Pages: 13
ISSN: 1063-8016|EISSN: 1533-8010|ISSN: 1063-8016|EISBN13: 9781615200627|EISSN: 1533-8010|DOI: 10.4018/jdm.2003040102
Cite Article Cite Article

MLA

Wilson, Rick L., and Peter A. Rosen. "Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases." JDM vol.14, no.2 2003: pp.14-26. http://doi.org/10.4018/jdm.2003040102

APA

Wilson, R. L. & Rosen, P. A. (2003). Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases. Journal of Database Management (JDM), 14(2), 14-26. http://doi.org/10.4018/jdm.2003040102

Chicago

Wilson, Rick L., and Peter A. Rosen. "Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases," Journal of Database Management (JDM) 14, no.2: 14-26. http://doi.org/10.4018/jdm.2003040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data perturbation is a data security technique that adds ‘noise’ to databases allowing individual record confidentiality. This technique allows users to ascertain key summary information about the data that is not distorted and does not lead to a security breach. Four bias types have been proposed which assess the effectiveness of such techniques. However, these biases only deal with simple aggregate concepts (averages, etc.) found in the database. To compete in today’s business environment, it is critical that organizations utilize data mining approaches to discover additional knowledge about themselves ‘hidden’ in their databases. Thus, database administrators are faced with competing objectives: protection of confidential data versus data disclosure for data mining applications. This paper empirically explores whether data protection provided by perturbation techniques adds a so-called data mining bias to the database. The results find initial support for the existence of this bias.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.