Beruflich Dokumente
Kultur Dokumente
www.ijasrm.com
ISSN 2455-6378
3. Preserving Datasets
When data resides in database it is still prone to attacks
[3], as it consists of users or organisations information
(may be confidential) which they may not like to share.
Therefore this information is protected by applying
some techniques such as perturbation, sampling,
At stage 2, the data is processed in warehouse to make transformations, etc. on the data collected to change it
it suitable for analysis. Data cleaning is done which in a way that it can be safely disclosed to untrusted
includes removing redundancy and unusable data. parties. In this case main purpose is to make sure that
Security at stage 2 is done by sanitizing data after any particular record cannot be identified uniquely.
which it can be revealed even to untrustworthy miners. As these techniques are manipulating datasets some
Many methods can be applied at this stage like inaccuracies in the results can be expected. The aim of
modelling, modification, sampling, blocking, etc. Then such techniques is to improve privacy as well as
data mining algorithms are applied for analysing or maintaining the validity and accuracy of results
predicting the results. obtained by data mining algorithms.
Secure Multiparty Computation (SMC), a fundamental
At the 3rd stage, the results obtained by applying data field in cryptography, allow multiple parties to
mining algorithms are checked for their sensitiveness collectively mine their data without revealing their
towards disclosure risks. Thus privacy preserving inputs (datasets) to each other. SMC is used
techniques must be applied at any stage according to successfully in applications. Though SMC can be an
requirement of application. The majority of existing ad-hoc, a much simpler and robust model, i.e. the DAG
algorithms can be classified into following broad model [11] is proposed by Sin G. Teo, Jianneng Cao,
categories: (i) techniques that prevent unprocessed data Vincent C.S. Lee, which uses simple mathematical
in data mining process, and (ii) techniques that protect operators +, - *, /, max and their compositions.
the data mining results [6].
160
International Journal of Advanced Scientific Research and Management, Vol. 1 Issue 5, May 2016.
www.ijasrm.com
ISSN 2455-6378
161
International Journal of Advanced Scientific Research and Management, Vol. 1 Issue 5, May 2016.
www.ijasrm.com
ISSN 2455-6378
[11] Teo S, Cao J., and Lee, DAG: A Model for Privacy
Preserving Computation, IEEE, International
Conference on Web Services, (2015).
162