1. Privacy preserving in data mining - Experimental research on SMEs data
- Author
-
Zita Bošnjak, Olivera Grljević, and Renata Mekovec
- Subjects
Information privacy ,Data collection ,Computer science ,Privacy software ,media_common.quotation_subject ,computer.software_genre ,Data warehouse ,privacy ,data mining ,privacy preserving techiques ,Information sensitivity ,Data quality ,Data analysis ,Quality (business) ,Data mining ,computer ,media_common - Abstract
Analysis of data on individuals and business sensitive data as well as revealing the results of such analysis without disclosing confidential and sensitive information is a very important issue. Many techniques for preserving privacy of data are currently being used. In this paper, we addressed the basic techniques: randomization, kanonymity, distributed privacy preserving and application effectiveness downgrading. Most of the techniques should be applied in the phase of data collection or their preprocessing, which can lead to different results (better or worse) of data mining than would be obtained on original data. For this reason, data analysts should be encouraged to quantify the ratio between privacy preserved in data with application of each technique and the loss of data or quality of outputs. In this paper, we illustrated the application of certain techniques for preserving privacy on experimental dataset, and we showed the effects that their use has on the results.
- Published
- 2011
- Full Text
- View/download PDF