Information Security in Bigdata

download Information Security in Bigdata

of 13

Transcript of Information Security in Bigdata

  • 7/24/2019 Information Security in Bigdata

    1/13

    Information Security In BigData

    UNDER THE GUIDANCE OF SUBMITTED BY:

    MR. N .PAPANNA M.TECH Y HEMANTH KUMAR REDDY

    DEPT.O !SE R.NO" #$#%&A'&()

    #

  • 7/24/2019 Information Security in Bigdata

    2/13

    !ontent* "

    A+*tract

    Intro,uction

    Big Data T-e Proce** Of Kno/e,ge Di*co0ery rom Data

    T-e Pri0acy !oncern

    %

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    3/13

    A+*tract

    T-e groing 1o1u/arity an, ,e0e/o1ment of

    ,ata mining tec-no/ogie* +ring *eriou* t-reat to t-e *ecurityof in,i0i,ua/2* *en*iti0e information. An emerging re*earc-to1ic in ,ata mining3 4non a* 1ri0acy 1re*er0ing ,ata mining

    5PPDM63 -a* +een e7ten*i0e/y *tu,ie, in recent year*. T-e+a*ic i,ea of PPDM i* to mo,ify t-e ,ata in *uc- a ay *o a*to 1erform ,ata mining a/gorit-m* e8ecti0e/y it-outcom1romi*ing t-e *ecurity of *en*iti0e information containe,in t-e ,ata. !urrent *tu,ie* of PPDM main/y focu* on -o to

    re,uce t-e 1ri0acy ri*4 +roug-t +y ,ata mining o1eration*3-i/e in fact3 unante, ,i*c/o*ure of *en*iti0e informationmay a/*o -a11en in t-e 1roce** of ,ata co//ecting3 ,ata1u+/i*-ing3 an, information 5i.e.3 t-e ,ata mining re*u/t*6,e/i0ering.

    (

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    4/13

    Intro,uction

    Data mining -a* attracte, more an,more attention in recent year*3 1ro+a+/y +ecau*e oft-e 1o1u/arity of t-e 99+ig ,ata22 conce1t. Data

    mining i* t-e 1roce** of ,i*co0ering intere*ting1attern* an, 4no/e,ge from /arge amount* of,ata . A* a -ig-/y a11/ication:,ri0en ,i*ci1/ine3 ,atamining -a* +een *ucce**fu//y a11/ie, to many,omain*3 *uc- a* +u*ine** inte//igence3 ;e+ *earc-3

    *cienti

  • 7/24/2019 Information Security in Bigdata

    5/13

    Big Data

    E7treme/y /arge ,ata *et* t-at may +e ana/y*e,

    com1utationa//y to re0ea/ 1attern*3 tren,*3 an, a**ociation*3e*1ecia//y re/ating to -uman +e-a0iour an, interaction*3 main*tream

    ,e

  • 7/24/2019 Information Security in Bigdata

    6/13

    T-e Proce** OfKno/e,ge Di*co0ery rom Data

    " T-e term 99,ata mining22 i* often treate, a* a *ynonym

    for anot-er term 994no/e,ge ,i*co0ery from ,ata225KDD6 -ic- -ig-/ig-t* t-e goa/ of t-e mining 1roce**.

    To o+tain u*efu/ 4no/e,ge from ,ata3 t-e fo//oing*te1* are 1erforme, in an iterati0e ay

    Data Pre1roce**ing

    Data Tran*formation

    Data Mining Pattern E0a/uation an, Pre*entation

    )

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    7/13

    An O0er0ie of T-e KDD Proce**"

    !o"le#$e

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    8/13

    T-e Pri0acy !oncern "

    De*1ite t-at t-e information ,i*co0ere, +y ,ata

    mining can +e 0ery 0a/ua+/e to many a11/ication*3 1eo1/e-a0e *-on increa*ing concern a+out t-e ot-er *i,e of t-ecoin3 name/y t-e 1ri0acy t-reat* 1o*e, +y ,ata mining.In,i0i,ua/2* 1ri0acy may +e 0io/ate, ,ue to t-e unaut-ori?e,

    acce** to 1er*ona/ ,ata3 t-e un,e*ire, ,i*co0ery of one2*em+arra**ing information3 t-e u*e of 1er*ona/ ,ata for1ur1o*e* ot-er t-an t-e one for -ic- ,ata -a* +eenco//ecte,3 etc. or in*tance3 t-e U.S. retai/er Target once

    recei0e, com1/aint* from a cu*tomer -o a* angry t-at

    Target *ent cou1on* for +a+y c/ot-e* to -i* teenager,aug-ter.# Hoe0er3 it a* true t-at t-e ,aug-ter a*1regnant at t-at time3 an, Target correct/y inferre, t-e fact +ymining it* cu*tomer ,ata. rom t-i* *tory3 e can *ee t-at t-e

    conict +eteen ,ata mining an, 1ri0acy *ecurity ,oe* e7i*t.

    C

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    9/13

    U*er Ro/e:Ba*e, Met-o,o/ogy "

    Ba*e, on t-e *tage ,i0i*ion in Kno/e,geDi*co0ery rom Data 1roce**. ;e can i,entify four,i8erent ty1e* of u*er*3 name/y four u*er ro/e*3 in aty1ica/ ,ata mining *cenario .

    Data Pro0i,er

    Data !o//ector

    Data Miner

    Deci*ion Ma4er

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    10/13

    A11roac-e* to Pri0acy Protection "

    %imit T&e Acce'' :(A ,ata 1ro0i,er 1ro0i,e* -i* ,ata to t-e

    co//ector in an acti0e ay or a 1a**i0e ay. By 99acti0e22 emean t-at t-e ,ata 1ro0i,er 0o/untari/y o1t* in a *ur0eyinitiate, +y t-e ,ata co//ector3 or

  • 7/24/2019 Information Security in Bigdata

    11/13

    !ontinue ...

    Tra#e )ri*acy For Be!e+t ":In *ome ca*e*3 t-e ,ata 1ro0i,er nee,* to

    ma4e a tra,e:o8 +eteen t-e /o** of 1ri0acy an, t-e+ene

  • 7/24/2019 Information Security in Bigdata

    12/13

    !ontinue...

    )ro*i#e Fal'e Data ":

    A* ,i*cu**e, a+o0e3 a ,ata 1ro0i,er can ta4e*ome mea*ure* to 1re0ent ,ata co//ector from acce**ing -i**en*iti0e ,ata. Hoe0er3 a ,i*a11ointe, fact t-at e -a0e toa,mit i* t-at no matter -o -ar, t-ey try3 Internet u*er*cannot com1/ete/y *to1 t-e unante, acce** to t-eir 1er*ona/information. So in*tea, of trying to /imit t-e acce**3 t-e ,ata1ro0i,er can 1ro0i,e fa/*e information to t-o*e untru*tort-y

    ,ata co//ector*.

    #%

    De1artment of !SE Information Security in Big

  • 7/24/2019 Information Security in Bigdata

    13/13

    T-e

    En, FT-an4 You or Your Attention

    #(