Information Security in Bigdata
Transcript of Information Security in Bigdata
-
7/24/2019 Information Security in Bigdata
1/13
Information Security In BigData
UNDER THE GUIDANCE OF SUBMITTED BY:
MR. N .PAPANNA M.TECH Y HEMANTH KUMAR REDDY
DEPT.O !SE R.NO" #$#%&A'&()
#
-
7/24/2019 Information Security in Bigdata
2/13
!ontent* "
A+*tract
Intro,uction
Big Data T-e Proce** Of Kno/e,ge Di*co0ery rom Data
T-e Pri0acy !oncern
%
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
3/13
A+*tract
T-e groing 1o1u/arity an, ,e0e/o1ment of
,ata mining tec-no/ogie* +ring *eriou* t-reat to t-e *ecurityof in,i0i,ua/2* *en*iti0e information. An emerging re*earc-to1ic in ,ata mining3 4non a* 1ri0acy 1re*er0ing ,ata mining
5PPDM63 -a* +een e7ten*i0e/y *tu,ie, in recent year*. T-e+a*ic i,ea of PPDM i* to mo,ify t-e ,ata in *uc- a ay *o a*to 1erform ,ata mining a/gorit-m* e8ecti0e/y it-outcom1romi*ing t-e *ecurity of *en*iti0e information containe,in t-e ,ata. !urrent *tu,ie* of PPDM main/y focu* on -o to
re,uce t-e 1ri0acy ri*4 +roug-t +y ,ata mining o1eration*3-i/e in fact3 unante, ,i*c/o*ure of *en*iti0e informationmay a/*o -a11en in t-e 1roce** of ,ata co//ecting3 ,ata1u+/i*-ing3 an, information 5i.e.3 t-e ,ata mining re*u/t*6,e/i0ering.
(
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
4/13
Intro,uction
Data mining -a* attracte, more an,more attention in recent year*3 1ro+a+/y +ecau*e oft-e 1o1u/arity of t-e 99+ig ,ata22 conce1t. Data
mining i* t-e 1roce** of ,i*co0ering intere*ting1attern* an, 4no/e,ge from /arge amount* of,ata . A* a -ig-/y a11/ication:,ri0en ,i*ci1/ine3 ,atamining -a* +een *ucce**fu//y a11/ie, to many,omain*3 *uc- a* +u*ine** inte//igence3 ;e+ *earc-3
*cienti
-
7/24/2019 Information Security in Bigdata
5/13
Big Data
E7treme/y /arge ,ata *et* t-at may +e ana/y*e,
com1utationa//y to re0ea/ 1attern*3 tren,*3 an, a**ociation*3e*1ecia//y re/ating to -uman +e-a0iour an, interaction*3 main*tream
,e
-
7/24/2019 Information Security in Bigdata
6/13
T-e Proce** OfKno/e,ge Di*co0ery rom Data
" T-e term 99,ata mining22 i* often treate, a* a *ynonym
for anot-er term 994no/e,ge ,i*co0ery from ,ata225KDD6 -ic- -ig-/ig-t* t-e goa/ of t-e mining 1roce**.
To o+tain u*efu/ 4no/e,ge from ,ata3 t-e fo//oing*te1* are 1erforme, in an iterati0e ay
Data Pre1roce**ing
Data Tran*formation
Data Mining Pattern E0a/uation an, Pre*entation
)
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
7/13
An O0er0ie of T-e KDD Proce**"
!o"le#$e
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
8/13
T-e Pri0acy !oncern "
De*1ite t-at t-e information ,i*co0ere, +y ,ata
mining can +e 0ery 0a/ua+/e to many a11/ication*3 1eo1/e-a0e *-on increa*ing concern a+out t-e ot-er *i,e of t-ecoin3 name/y t-e 1ri0acy t-reat* 1o*e, +y ,ata mining.In,i0i,ua/2* 1ri0acy may +e 0io/ate, ,ue to t-e unaut-ori?e,
acce** to 1er*ona/ ,ata3 t-e un,e*ire, ,i*co0ery of one2*em+arra**ing information3 t-e u*e of 1er*ona/ ,ata for1ur1o*e* ot-er t-an t-e one for -ic- ,ata -a* +eenco//ecte,3 etc. or in*tance3 t-e U.S. retai/er Target once
recei0e, com1/aint* from a cu*tomer -o a* angry t-at
Target *ent cou1on* for +a+y c/ot-e* to -i* teenager,aug-ter.# Hoe0er3 it a* true t-at t-e ,aug-ter a*1regnant at t-at time3 an, Target correct/y inferre, t-e fact +ymining it* cu*tomer ,ata. rom t-i* *tory3 e can *ee t-at t-e
conict +eteen ,ata mining an, 1ri0acy *ecurity ,oe* e7i*t.
C
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
9/13
U*er Ro/e:Ba*e, Met-o,o/ogy "
Ba*e, on t-e *tage ,i0i*ion in Kno/e,geDi*co0ery rom Data 1roce**. ;e can i,entify four,i8erent ty1e* of u*er*3 name/y four u*er ro/e*3 in aty1ica/ ,ata mining *cenario .
Data Pro0i,er
Data !o//ector
Data Miner
Deci*ion Ma4er
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
10/13
A11roac-e* to Pri0acy Protection "
%imit T&e Acce'' :(A ,ata 1ro0i,er 1ro0i,e* -i* ,ata to t-e
co//ector in an acti0e ay or a 1a**i0e ay. By 99acti0e22 emean t-at t-e ,ata 1ro0i,er 0o/untari/y o1t* in a *ur0eyinitiate, +y t-e ,ata co//ector3 or
-
7/24/2019 Information Security in Bigdata
11/13
!ontinue ...
Tra#e )ri*acy For Be!e+t ":In *ome ca*e*3 t-e ,ata 1ro0i,er nee,* to
ma4e a tra,e:o8 +eteen t-e /o** of 1ri0acy an, t-e+ene
-
7/24/2019 Information Security in Bigdata
12/13
!ontinue...
)ro*i#e Fal'e Data ":
A* ,i*cu**e, a+o0e3 a ,ata 1ro0i,er can ta4e*ome mea*ure* to 1re0ent ,ata co//ector from acce**ing -i**en*iti0e ,ata. Hoe0er3 a ,i*a11ointe, fact t-at e -a0e toa,mit i* t-at no matter -o -ar, t-ey try3 Internet u*er*cannot com1/ete/y *to1 t-e unante, acce** to t-eir 1er*ona/information. So in*tea, of trying to /imit t-e acce**3 t-e ,ata1ro0i,er can 1ro0i,e fa/*e information to t-o*e untru*tort-y
,ata co//ector*.
#%
De1artment of !SE Information Security in Big
-
7/24/2019 Information Security in Bigdata
13/13
T-e
En, FT-an4 You or Your Attention
#(