Protecting business intelligence and customer privacy while outsourcing data mining tasks

被引:25
|
作者
Qiu, Ling [1 ]
Li, Yingjiu [2 ]
Wu, Xintao [3 ]
机构
[1] James Cook Univ, Sch Math Phys & Informat Technol, Townsville, Qld 4811, Australia
[2] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[3] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
基金
美国国家科学基金会;
关键词
False Positive Rate; Hash Function; Association Rule; False Negative Rate; Storage Requirement;
D O I
10.1007/s10115-007-0113-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the storage requirement.
引用
收藏
页码:99 / 120
页数:22
相关论文
共 50 条
  • [1] Protecting business intelligence and customer privacy while outsourcing data mining tasks
    Ling Qiu
    Yingjiu Li
    Xintao Wu
    [J]. Knowledge and Information Systems, 2008, 17 : 99 - 120
  • [2] An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy
    Qiu, Ling
    Li, Yingjiu
    Wu, Xintao
    [J]. ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 551 - 555
  • [3] Analysis of Privacy-Preserving Mechanisms for Outsourcing Data Mining Tasks
    Chiew, Kevin
    Qin, Shaowen
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12542 - +
  • [4] Protecting privacy while revealing data
    Huberman, BA
    Hogg, T
    [J]. NATURE BIOTECHNOLOGY, 2002, 20 (04) : 332 - 332
  • [5] Protecting privacy while revealing data
    Bernardo A. Huberman
    Tad Hogg
    [J]. Nature Biotechnology, 2002, 20 : 332 - 332
  • [6] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [7] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [8] PASSPHONE: Outsourcing Phone-Based Web Authentication While Protecting User Privacy
    Potthast, Martin
    Forler, Christian
    List, Eik
    Lucks, Stefan
    [J]. SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 235 - 255
  • [9] Spatial data mining method for customer intelligence
    Fan, B
    Li, YJ
    Yan, XB
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 305 - 309
  • [10] Spatial data mining framework for customer intelligence
    Fan, B
    Li, YJ
    Wang, LH
    [J]. PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2003, : 189 - 194