Protecting business intelligence and customer privacy while outsourcing data mining tasks

被引:0
|
作者
Ling Qiu
Yingjiu Li
Xintao Wu
机构
[1] James Cook University,School of Mathematics, Physics and Information Technology
[2] Singapore Management University,School of Information Systems
[3] University of North Carolina at Charlotte,Department of Software and Information Systems
来源
关键词
False Positive Rate; Hash Function; Association Rule; False Negative Rate; Storage Requirement;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the storage requirement.
引用
收藏
页码:99 / 120
页数:21
相关论文
共 50 条
  • [1] Protecting business intelligence and customer privacy while outsourcing data mining tasks
    Qiu, Ling
    Li, Yingjiu
    Wu, Xintao
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 17 (01) : 99 - 120
  • [2] An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy
    Qiu, Ling
    Li, Yingjiu
    Wu, Xintao
    [J]. ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 551 - 555
  • [3] Analysis of Privacy-Preserving Mechanisms for Outsourcing Data Mining Tasks
    Chiew, Kevin
    Qin, Shaowen
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12542 - +
  • [4] Protecting privacy while revealing data
    Huberman, BA
    Hogg, T
    [J]. NATURE BIOTECHNOLOGY, 2002, 20 (04) : 332 - 332
  • [5] Protecting privacy while revealing data
    Bernardo A. Huberman
    Tad Hogg
    [J]. Nature Biotechnology, 2002, 20 : 332 - 332
  • [6] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [7] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [8] PASSPHONE: Outsourcing Phone-Based Web Authentication While Protecting User Privacy
    Potthast, Martin
    Forler, Christian
    List, Eik
    Lucks, Stefan
    [J]. SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 235 - 255
  • [9] Spatial data mining method for customer intelligence
    Fan, B
    Li, YJ
    Yan, XB
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 305 - 309
  • [10] Spatial data mining framework for customer intelligence
    Fan, B
    Li, YJ
    Wang, LH
    [J]. PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2003, : 189 - 194