Individual Privacy and Organizational Privacy in Business Analytics

The use of business analytics to reveal useful information from transactional and operational databases involves accessing private information of both individuals and organizations. This practice has raised the privacy concern of individuals and policy makers. In this paper, we propose a privacy preserving approach for business analytics based on keyed bloom filters. We illustrate this approach using market basket analysis, and then evaluate its performance using real datasets from a point-of-sale and Web clickstream. The major advantage of this approach is the positive relationship for the level of privacy security and analysis precision. In other words, the tradeoff of the level of privacy protection for our solution is data storage space; whereas for other existing methods, there is always a tradeoff between analysis precision and the level of privacy protection

[1]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[2]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[3]  Rathindra Sarathy,et al.  Secure and useful data sharing , 2006, Decis. Support Syst..

[4]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[5]  Roberto J. Bayardo,et al.  Technological Solutions for Protecting Privacy , 2003, Computer.

[6]  Michael J. Shaw,et al.  Knowledge management and data mining for marketing , 2001, Decis. Support Syst..

[7]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[8]  Ron Kohavi,et al.  Emerging trends in business analytics , 2002, CACM.

[9]  R. Rao,et al.  Research Note---Using Basket Composition Data for Intelligent Supermarket Pricing , 2006 .

[10]  Chris Clifton,et al.  Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.

[11]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[12]  Jayant R. Haritsa,et al.  A Framework for High-Accuracy Privacy-Preserving Mining , 2005, ICDE.

[13]  Elisa Bertino,et al.  A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.

[14]  Yen-Liang Chen,et al.  Market basket analysis in a multiple store environment , 2005, Decis. Support Syst..

[15]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[16]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[17]  Il-Yeol Song,et al.  Data warehouse design to support customer relationship management analyses , 2004, DOLAP '04.

[18]  Padhraic Smyth,et al.  Business applications of data mining , 2002, CACM.

[19]  Ling Qiu,et al.  Preserving privacy in association rule mining with bloom filters , 2006, Journal of Intelligent Information Systems.

[20]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[21]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[22]  Mary J. Culnan,et al.  Giant Food and Elensys: Looking Out For Customer Gross Privacy Invasion? , 2005, Commun. Assoc. Inf. Syst..

[23]  George R. Milne Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue , 2000 .