Abstract
Business Intelligence brings information in an intelligent way that enable a requester of data to analyze, justify their views and make timely decisions. In all these processes a good amount of data may be exposed based on user profile and in varying degree of extent. Also, the recent trends in Information Management such as cloud computing and pervasive BI, has set forth many questions in the arena of legal compliance and information security. Especially when, millions of customer records of an organization are outsourced for testing, warehousing and data mining. In this paper, we present an approach that will require a new layer to be incorporated for business intelligence architecture and shall be used to preserve the privacy of sensitive information without changing the consolidated, processed and strategically aggregated data; keeping intact the analysis and mining needs of stakeholders within and outside the organization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Edgar, D.: Data Sanitization Techniques, Net 2000 Ltd. Net 2000 Ltd. (2003-2004) (as on May/10/2010)
Fule, P., Roddick, J.F.: Detecting Privacy and Ethical Sensitivity in Data Mining Results. In: Estivill-Castro, V. (ed.) Proc. Twenty-Seventh Australasian Computer Science Conference (ACSC 2004), Dunedin, New Zealand. CRPIT, vol. 26, pp. 159–166. ACS (2004)
Gorawski, M., Bularz, J.: Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. In: Proceedings of the Second International Conference on Availability, Reliability and Security, ARES, April 10-13, pp. 837–844. IEEE Computer Society, Washington (2007)
HP, Top 10 trends in Business Intelligence for 2010, Business White Paper, Rev. 1 (February 2010), http://h20195.www2.hp.com/v2/GetPDF.aspx/4AA0-6420ENW.pdf (as on May/10/2010)
Inmon, W.H.: Building the Data Warehouse, 4th edn. John Wiley and Sons, Chichester (2005)
Kimball, R., Reeves, L., Ross, M., Thornthwaite, W.: The Data Warehouse Lifecycle Toolkit: Expert Methods for Designing, Developing, and Deploying Data Warehouses. John Wiley and Sons, Chichester (August 1998)
Korolov, M.: ‘Vast Gaps’ in Data Protection, Information Management Online (March 10, 2010), http://www.information-management.com/news/data_protection_security-10017342-1.html (as on May/10/2010)
Net 2000 Ltd., Data Scrambling Issues, Net 2000 Ltd. (2005), http://www.datamasker.com/datascramblingissues.pdf (as on May/10/2010)
Pannala, V., Bhattacharya, S., Saxena, A.: Synthetic Data for Privacy Preserving Data Mining. In: Proceedings of the 2007 International Conference on Data Mining, DMIN 2007, Las Vegas, Nevada, USA, June 25-28 (2007)
Qiu, L., Li, Y., Wu, X.: An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. In: Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops, ICDMW, December 18-22, pp. 551–558. IEEE Computer Society, Washington (2006)
Singh, M.D., Krishna, P.R., Saxena, A.: A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of the Third Annual ACM Bangalore Conference, COMPUTE 2010, Bangalore, India, January 22-23, pp. 1–4. ACM, New York (2010)
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in Privacy Preserving Data Mining. SIGMOD Record 33(1) (March 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gupta, V., Saxena, A. (2010). Privacy Layer for Business Intelligence. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)