Protecting business intelligence and customer privacy while outsourcing data mining tasks

被引:0
|
作者
Ling Qiu
Yingjiu Li
Xintao Wu
机构
[1] James Cook University,School of Mathematics, Physics and Information Technology
[2] Singapore Management University,School of Information Systems
[3] University of North Carolina at Charlotte,Department of Software and Information Systems
来源
关键词
False Positive Rate; Hash Function; Association Rule; False Negative Rate; Storage Requirement;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the storage requirement.
引用
收藏
页码:99 / 120
页数:21
相关论文
共 50 条
  • [41] A Differential Privacy-based Protecting Data Preprocessing Method for Big Data Mining
    Mo, Ran
    Liu, Jianfeng
    Yu, Wentao
    Jiang, Fu
    Gu, Xin
    Zhao, Xiaoshuai
    Liu, Weirong
    Peng, Jun
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 693 - 699
  • [42] A Fair, Verifiable and Privacy-Protecting Data Outsourcing Transaction Scheme Based on Smart Contracts
    Li, Lina
    Zhang, Tingting
    Sun, Guodong
    Jin, Dezheng
    Li, Nianfeng
    [J]. IEEE ACCESS, 2022, 10 : 106873 - 106885
  • [43] Protecting Sensitive Business Information while Sharing Serial-Level Data
    Zanetti, Davide
    Capkun, Srdjan
    [J]. EDOCW: 2008 12TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS, 2008, : 248 - +
  • [44] Protecting Privacy While Optimizing the Use of (Health)Data: The Importance of Measures and Safeguards COMMENT
    Smit, Julie-Anne R.
    Mostert, Menno
    van Delden, Johannes J. M.
    [J]. AMERICAN JOURNAL OF BIOETHICS, 2022, 22 (07): : 79 - 81
  • [45] Customer and Business Analytics: Applied Data Mining for Business Decision Making Using R
    Scott, David
    [J]. INTERNATIONAL STATISTICAL REVIEW, 2013, 81 (02) : 328 - 328
  • [46] An Intelligent Framework for Protecting Privacy of Individuals Empirical Evaluations on Data Mining Classification
    Panackal, Jisha Jose
    Pillai, Anitha S.
    [J]. 2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2014, : 67 - 72
  • [47] Customer intelligence system based on improving LTV model and data mining
    Chen, Yu-Zhe
    Zhao, Ming-Hua
    Zhao, Shu-Liang
    Wang, Yan-Jun
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1352 - +
  • [48] Business Intelligence Applications in Retail Business: OLAP, Data Mining & Reporting Services
    Kocakoc, Ipek Deveci
    Erdem, Sabri
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2010, 9 (02) : 171 - 181
  • [49] Data mining application in customer relationship management of credit card business
    Wu, RC
    Chen, RS
    Chang, CC
    Chen, JY
    [J]. Proceedings of the 29th Annual International Computer Software and Applications Conference, Workshops and Fast Abstracts, 2005, : 39 - 40
  • [50] A review of market basket analysis on business intelligence and data mining
    Sjarif, Nilam Nur Amir
    Azmi, Nurulhuda Firdaus Mohd
    And, Siti Sophiayati Yuhaniz
    Wong, Doris Hooi-Ten
    [J]. International Journal of Business Intelligence and Data Mining, 2021, 18 (03) : 383 - 394