Skip to main content

Privacy Layer for Business Intelligence

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

Business Intelligence brings information in an intelligent way that enable a requester of data to analyze, justify their views and make timely decisions. In all these processes a good amount of data may be exposed based on user profile and in varying degree of extent. Also, the recent trends in Information Management such as cloud computing and pervasive BI, has set forth many questions in the arena of legal compliance and information security. Especially when, millions of customer records of an organization are outsourced for testing, warehousing and data mining. In this paper, we present an approach that will require a new layer to be incorporated for business intelligence architecture and shall be used to preserve the privacy of sensitive information without changing the consolidated, processed and strategically aggregated data; keeping intact the analysis and mining needs of stakeholders within and outside the organization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Edgar, D.: Data Sanitization Techniques, Net 2000 Ltd. Net 2000 Ltd. (2003-2004) (as on May/10/2010)

    Google Scholar 

  2. Fule, P., Roddick, J.F.: Detecting Privacy and Ethical Sensitivity in Data Mining Results. In: Estivill-Castro, V. (ed.) Proc. Twenty-Seventh Australasian Computer Science Conference (ACSC 2004), Dunedin, New Zealand. CRPIT, vol. 26, pp. 159–166. ACS (2004)

    Google Scholar 

  3. Gorawski, M., Bularz, J.: Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. In: Proceedings of the Second International Conference on Availability, Reliability and Security, ARES, April 10-13, pp. 837–844. IEEE Computer Society, Washington (2007)

    Chapter  Google Scholar 

  4. HP, Top 10 trends in Business Intelligence for 2010, Business White Paper, Rev. 1 (February 2010), http://h20195.www2.hp.com/v2/GetPDF.aspx/4AA0-6420ENW.pdf (as on May/10/2010)

  5. Inmon, W.H.: Building the Data Warehouse, 4th edn. John Wiley and Sons, Chichester (2005)

    Google Scholar 

  6. Kimball, R., Reeves, L., Ross, M., Thornthwaite, W.: The Data Warehouse Lifecycle Toolkit: Expert Methods for Designing, Developing, and Deploying Data Warehouses. John Wiley and Sons, Chichester (August 1998)

    Google Scholar 

  7. Korolov, M.: ‘Vast Gaps’ in Data Protection, Information Management Online (March 10, 2010), http://www.information-management.com/news/data_protection_security-10017342-1.html (as on May/10/2010)

  8. Net 2000 Ltd., Data Scrambling Issues, Net 2000 Ltd. (2005), http://www.datamasker.com/datascramblingissues.pdf (as on May/10/2010)

  9. Pannala, V., Bhattacharya, S., Saxena, A.: Synthetic Data for Privacy Preserving Data Mining. In: Proceedings of the 2007 International Conference on Data Mining, DMIN 2007, Las Vegas, Nevada, USA, June 25-28 (2007)

    Google Scholar 

  10. Qiu, L., Li, Y., Wu, X.: An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. In: Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops, ICDMW, December 18-22, pp. 551–558. IEEE Computer Society, Washington (2006)

    Chapter  Google Scholar 

  11. Singh, M.D., Krishna, P.R., Saxena, A.: A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of the Third Annual ACM Bangalore Conference, COMPUTE 2010, Bangalore, India, January 22-23, pp. 1–4. ACM, New York (2010)

    Chapter  Google Scholar 

  12. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in Privacy Preserving Data Mining. SIGMOD Record 33(1) (March 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gupta, V., Saxena, A. (2010). Privacy Layer for Business Intelligence. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics