Skip to main content

Data Privacy in Online Shopping

  • Conference paper
  • First Online:
Computer Communication, Networking and Internet Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 5))

Abstract

The Online Shopping experience has provided the new ways of business and shopping. Now the traditional way of shopping has changed into easy and convenience manner according to customer shopping behavior and preferences. Extracting shopping patterns from increasing data is not a trivial task. This paper will help to understand the importance of data mining techniques i.e., Association rule mining is to get relationships between different items in the dataset, and frequent item set mining aims to find the regularities in the shopping behavior of customers, clustering and concept hierarchy to provide business intelligence to improve sales, marketing and consumers satisfaction. In this paper while using data mining techniques there is data susceptibility, which is influenced by attacks like membership disclosure protection and homogeneity attack. These attacks deal with reveal of information based on quasi identifier value in the data set. In this paper, protecting sensitive information is an important problem. Detailed analysis of these both attacks are given and proposed a privacy definition called L-Diversity, which can be implemented and experimental evaluation is also shown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. H. Aly, A. A. Amr, and Y. Taha, “Fast Mining of Association Rules in Large-Scale Problems,” Proc. IEEE Symp. Computers and Comm. (ISCC “01), pp. 107–113, 2001.

    Google Scholar 

  2. Kasun Wickramaratna, Miroslav Kubat and Kamal Premaratne, “Predicting Missing Items in Shopping Carts”, IEEE Trans. Knowledge and Data Eng., vol. 21, no. 7, july 2009.

    Google Scholar 

  3. P. Bollmann-Sdorra, A. Hafez, and V. V. Raghavan, “A Theoretical Framework for Association Mining Based on the Boolean Retrieval Model,” Data Warehousing and Knowledge Discovery: Proc. Third Int‟l Conf. (DaWaK‟01), pp. 21–30, Sept. 2001.

    Google Scholar 

  4. W. Li, J. Han, and J. Pei, “CMAR: Accurate and Efficient Classification Based on Multiple Class-Association Rules,” Proc. IEEE Int‟l Conf. Data Mining (ICDM ‟01), pp. 369–376, Nov./Dec. 2001.

    Google Scholar 

  5. Quinlan, J. (1986), “Induction of Decision Trees,” Machine Learning, vol. 1, pp. 81–106.

    Google Scholar 

  6. XHEMALI, Daniela and J. HINDE, Christopher and G. STONE, Naive Bayes vs. Decision Trees vs. Neural Networks in the Classification of Training Web Pages, IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009.

    Google Scholar 

  7. A. Sopharak, K. Thet Nwe, Y. Aye Moe, Matthew N. Dailey and B. Uyyanonvara, “Automatic Exudates Detection with a Naive Bayes Classifier”, Proceedings of the International Conference on Embedded Systems and Intelligent Technology, pp. 139–142, February 27–29, 2008.

    Google Scholar 

  8. E. W. T. Ngai, Li Xiu and D. C. K. Chau, 2009, Application of data mining techniques in customer relationship management: A literature review and classification, Expert Systems with Applications, Vol 36, Issue 2, Part 2, pp 2592–2602.

    Google Scholar 

  9. Magdalena G, T. Lasota, B. Trawiński “Comparative Analysis of Premises Valuation Models Using KEEL, RapidMiner, and WEKA” First International Conference, ICCCI, Wrocław, Poland, Oct 5–7, 2009. Proc., pp 800–812.

    Google Scholar 

  10. Tibshirani, R., Walther, G., and Hastie, T, 2001, estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society. Series B, Statistical methodology, 63:411–423.

    Google Scholar 

  11. G L. Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557–570, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashidhar Virupaksha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Virupaksha, S., Gavini, D., Venkatesulu, D. (2017). Data Privacy in Online Shopping. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3226-4_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3225-7

  • Online ISBN: 978-981-10-3226-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics