This document discusses principles for protecting privacy in data mining and warehousing. It defines information privacy and discusses how privacy relates to data collection, technology, and public expectations. It also discusses privacy-preserving data mining and how privacy risks can occur during data collection, publishing, and delivery. Four types of users are involved in these processes: data providers, collectors, miners, and decision makers. The document also covers authentication, confidentiality, and approaches to maintaining confidentiality. Finally, it lists 10 information privacy principles and examples of hardware and software tools that can be used to protect privacy and security.
2. Privacy
Information Privacy is the relationship between collection and
dissemination of:
● Data
● Technology
● The public expectation of privacy
● Legal and Public issues surrounding them
3. Privacy in Data Mining
● The growing popularity and development of data mining technologies
bring serious threat to the security of individual,'s sensitive
information.
● An emerging research topic in data mining, known as privacy-
preserving data mining (PPDM)
4. ● Current studies of PPDM mainly focus on how to reduce the privacy risk
brought by data mining operations, while in fact, unwanted disclosure of
sensitive information may also happen in the process of data collecting,
data publishing, and information (i.e., the data mining results) delivering.
Four types of users are involved:
i) Data Provider
ii) Data collector
iii) Data miner
iv) Decision Maker
6. Confidentiality
Confidentiality involves a set of rules or a promise that limits access or
places restrictions on certain types of information.
Role based methodology can be used to provide confidentiality.
● Four types of users are involved:
i)Data Provider
ii)Data collector
iii)Data miner
iv)Decision Maker
8. Principles Of Information Privacy
IPP1:Collection
IPP2:Use and Disclosure
IPP3:Data Quality
IPP4:Data Security
IPP5:Openness
IPP6:Access and Correction
IPP7:Identifiers
IPP8:Anonymity
IPP9:Transboarder data flows
IPP10:Sensitive Information
11. Software
● Secure Shell
● Pretty Good Privacy (PGP)
● GNU Privacy Guard (GPG)
● I2P
● Anonymity Network
12. Conclusion
● Information is an assets for the business which requires adequate
protection to add value to everything it relates.
● Through
Confidentiality( authorized person only)
Integrity ( reliable and not corrupted )
Availability ( assurance that can be used as required )