Protecting business intelligence and customer privacy while outsourcing data mining tasks

被引:0
|
作者
Ling Qiu
Yingjiu Li
Xintao Wu
机构
[1] James Cook University,School of Mathematics, Physics and Information Technology
[2] Singapore Management University,School of Information Systems
[3] University of North Carolina at Charlotte,Department of Software and Information Systems
来源
关键词
False Positive Rate; Hash Function; Association Rule; False Negative Rate; Storage Requirement;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the storage requirement.
引用
收藏
页码:99 / 120
页数:21
相关论文
共 50 条
  • [21] Visual data mining for business intelligence applications
    Hao, M
    Dayal, U
    Hsu, M
    [J]. WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2000, 1846 : 3 - 14
  • [22] Data mining business intelligence for competitive advantage
    Gupta, RK
    [J]. ELECTRONICS INFORMATION & PLANNING, 2001, 29 (01): : 27 - 42
  • [23] Business Intelligence using Data Mining Techniques and Business Analytics
    Mishra, Brojo Kishore
    Hazra, Deepannita
    Tarannum, Kahkashan
    Kumar, Manas
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 84 - 89
  • [24] DATA MINING APPROACHES IN BUSINESS INTELLIGENCE: POSTGRADUATE DATA ANALYTIC
    Kumaran, Shamini Raja
    Othman, Mohd Shahizan
    Yusuf, Lizawati Mi
    [J]. JURNAL TEKNOLOGI, 2016, 78 (8-2): : 75 - 79
  • [25] Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities
    Grandison, Tyrone
    Ganta, Srivatsava Ranjit
    Braun, Uri
    Kaufman, James
    [J]. MEDINFO 2007: PROCEEDINGS OF THE 12TH WORLD CONGRESS ON HEALTH (MEDICAL) INFORMATICS, PTS 1 AND 2: BUILDING SUSTAINABLE HEALTH SYSTEMS, 2007, 129 : 483 - +
  • [26] Privacy-Preserving Outsourcing of Pattern Mining of Event-Log Data
    Marrella, Alessandro
    Monreale, Anna
    Kloepper, Benjamin
    Krueger, Martin W.
    [J]. 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 545 - 551
  • [27] Data Mining Techniques for Business Intelligence in Educational System: A Case Mining
    Khan, Mohiuddin Ali
    Gharibi, Wajeb
    Pradhan, Sateesh Kumar
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [28] Data mining for decision support on customer insolvency in telecommunications business
    Daskalaki, S
    Kopanas, I
    Goudara, M
    Avouris, N
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2003, 145 (02) : 239 - 255
  • [29] An Advanced Inventory Data Mining System for Business Intelligence
    Zhou, Qifeng
    Xia, Bin
    Xue, Wei
    Zeng, Chunqiu
    Han, Ruyuan
    Li, Tao
    [J]. 2017 THIRD IEEE INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2017), 2017, : 210 - 217
  • [30] INTEGRATING DATA MINING TECHNIQUES INTO BUSINESS INTELLIGENCE SYSTEMS
    Petre, Ruxandra
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2013, : 619 - 623