DocumentCode :
1564491
Title :
Homeland security and privacy sensitive data mining from multi-party distributed resources
Author :
Kargupta, Hillol ; Liu, Kun ; Datta, Souptik ; Ryan, Jessica ; Sivakumar, Krishnamoorthy
Author_Institution :
Dept. of Comput. Sci. & Electr. Eng., Maryland Univ., Baltimore, MD, USA
Volume :
2
fYear :
2003
Firstpage :
1257
Abstract :
Defending the safety of an open society from terrorism or other similar threats requires intelligent but careful ways to monitor different types of activities and transactions in the electronic media. Data mining techniques are playing an increasingly important role in sifting through large amount of data in search of useful patterns that might help us in securing our safety. Although the objective of this class of data mining applications is very well justified, they also open up the possibility of misusing personal information by malicious people with access to the sensitive data. This brings up the following question: Can we design data mining techniques that are sensitive to privacy? Several researchers are currently working on a class of data mining algorithms that work without directly accessing the sensitive data in their original form. This paper considers the problem of mining distributed data in a privacy-sensitive manner. It first points out the problems of some of the existing privacy-sensitive data mining techniques that make use of additive random noise to hide sensitive information. Next it briefly reviews some new approaches that make use of random projection matrices for computing statistical aggregates from sensitive data.
Keywords :
data mining; data privacy; information retrieval; security; data mining algorithms; elctronic media transactions; homeland security; malicious people; multi-party distributed resources; privacy sensitive data mining; privacy sensitive manner; random projection matrices; sensitive data access; statistical aggregates; Additive noise; Aggregates; Computer science; Computerized monitoring; Data mining; Data privacy; Perturbation methods; Safety; Social network services; Terrorism;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fuzzy Systems, 2003. FUZZ '03. The 12th IEEE International Conference on
Print_ISBN :
0-7803-7810-5
Type :
conf
DOI :
10.1109/FUZZ.2003.1206611
Filename :
1206611
Link To Document :
بازگشت