Consumer Data and Privacy in Ubiquitous Computing

The emergence of ubiquitous computing means new devices, sensors, and protocols around the society, and thus new sources of consumer data. The new data sources along with new means for individual identification constitute a personal privacy concern: what could and should not be done with personal data. Personal privacy issue is accompanied with corporate privacy when data mining tasks are applied to consumer databases. The ubiquitous computing environment will provide various data sources, these databases will be distributed among various agents. One of the emergent phenomenon that ubiquitous computing will create is context-awareness. The privacy-preserving perspective on data mining is relatively young area. The research done in the area is mainly theoretical, to best of our understanding no real-world applications exist. In this work we have tried to fill this cap. The current trend with growing amount of personalization in online services has created also applications for personalized marketing. Personalized marketing services use detailed information about the context and personal history of a customer. This needs sophisticated individual identification methods, which raise privacy concern. The novelty in privacy-preserving methods is that sensitive and distributed data could be used for data mining task and the privacy of individuals is preserved. This thesis has two objectives: first is to use consumer data from distributed sources and study how customer segmentation is possible while preserving the privacy. The idea is to conduct the customer segmentation in a way that the data need not leave the agent holding the data. The other objective is the value of the knowledge acquired from collectively conducted segmentation. We believe that collectively conducted segmentation produces knowledge that cannot be acquired otherwise. The results of this work show that privacy-preserving customer segmentation is possible and the collectively conducted segmentation produces new knowledge.

[1]  Joydeep Ghosh,et al.  Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.

[2]  John Riedl,et al.  E-Commerce Recommendation Applications , 2004, Data Mining and Knowledge Discovery.

[3]  Dimitris K. Tasoulis,et al.  Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data , 2006, ICCSA.

[4]  Mervi Toivari,et al.  Engineering the pentose phosphate pathway of Saccharomyces cerevisiae for production of ethanol and xylitol , 2007 .

[5]  D. Ruppert The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .

[6]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[7]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .

[8]  Matthias Klusch,et al.  Inference on Distributed Data Clustering , 2005, MLDM.

[9]  J. Leppänen Development of a New Monte Carlo reactor physics code , 2007 .

[10]  Chris Clifton,et al.  Privacy-preserving clustering with distributed EM mixture modeling , 2004, Knowledge and Information Systems.

[11]  Lambèr M. M. Royakkers,et al.  Ethical issues in web data mining , 2004, Ethics and Information Technology.

[12]  Martin Natter,et al.  Collaborative filtering or regression models for Internet recommendation systems? , 2002 .

[13]  Alfred Kobsa,et al.  Impacts of User Privacy Preferences on Personalized Systems , 2004, Designing Personalized User Experiences in eCommerce.

[14]  Flavia Sparacino Narrative Spaces: bridging architecture and entertainment via interactive technology , 2002 .

[15]  Mikhail J. Atallah,et al.  Private collaborative forecasting and benchmarking , 2004, WPES '04.

[16]  Chris Clifton,et al.  Defining Privacy for Data Mining , 2002 .

[17]  Mikhail J. Atallah,et al.  Privacy preserving route planning , 2004, WPES '04.

[18]  Maria Halkidi,et al.  An Introduction to Quality Assessment in Data Mining , 2002 .

[19]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[20]  Paul S. Bradley,et al.  Refining Initial Points for K-Means Clustering , 1998, ICML.

[21]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[22]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.

[23]  Arja Laitila,et al.  Microbes in the tailoring of barley malt properties , 2007 .

[24]  Rebecca N. Wright,et al.  Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.

[25]  Cynthia Dwork,et al.  Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.

[26]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[27]  Chris Clifton,et al.  Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.

[28]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[29]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[30]  Jan Saijets,et al.  VTT PUBLICATIONS 644 MOSFET RF Characterization Using Bulk and SOI CMOS Technologies , 2007 .

[31]  B. Thuraisingham Privacy-Preserving Data Mining : Developments and Directions , 2004 .

[32]  Stanley R. M. Oliveira,et al.  Toward Standardization in Privacy-Preserving Data Mining , 2004 .

[33]  LindenGreg,et al.  Amazon.com Recommendations , 2003 .

[34]  J. Rubenfeld The Right of Privacy , 1989 .

[35]  Kimmo Solehmainen,et al.  Fabrication of microphotonic waveguide components on silicon , 2007 .

[36]  Elisa Bertino,et al.  A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.

[37]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[38]  Rebecca N. Wright,et al.  Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.

[39]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[40]  Bhavani M. Thuraisingham,et al.  Privacy-Preserving Data Mining: Development and Directions , 2005, J. Database Manag..

[41]  O. Günther,et al.  Privacy conflicts in CRM services for online shops: a case study , 2002 .

[42]  Dino Pedreschi,et al.  Towards low-perturbation anonymity preserving pattern discovery , 2006, SAC '06.

[43]  Harold Davis Google advertising tools , 2006 .

[44]  Kathryn Elliot,et al.  Time, Meaning and Ownership: the Value of Location in the Home , 2004 .

[45]  Petri Kotiluoto,et al.  Adaptive tree multigrids and simplified spherical harmonics approximation in deterministic neutral and charged particle transport , 2007 .

[46]  John Thackara,et al.  In the Bubble: Designing in a Complex World , 2005 .

[47]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[48]  Rene Hexel,et al.  User Identity and Ubiquitous Computing: User Selected Pseudonyms , 2005 .

[49]  Osmar R. Zaïane,et al.  Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..

[50]  B. Briscoe,et al.  Metcalfe's law is wrong - communications networks increase in value as they add members-but by how much? , 2006, IEEE Spectrum.

[51]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[52]  Tsan-sheng Hsu,et al.  Preserving confidentiality when sharing medical database with the Cellsecu system , 2003, Int. J. Medical Informatics.

[53]  Alexandre V. Evfimievski,et al.  Randomization in privacy preserving data mining , 2002, SKDD.

[54]  Mark Weiser The computer for the 21st century , 1991 .

[55]  J. Avery,et al.  The long tail. , 1995, Journal of the Tennessee Medical Association.

[56]  Kalle Lyytinen,et al.  Issues and Challenges in Ubiquitous Computing , 2002 .

[57]  William J. Mitchell Narrative Spaces : bridging architecture and entertainment via interactive technology , 2002 .