Data mining, national security, privacy and civil liberties

@article{Thuraisingham2002DataMN,
  title={Data mining, national security, privacy and civil liberties},
  author={Bhavani M. Thuraisingham},
  journal={SIGKDD Explor.},
  year={2002},
  volume={4},
  pages={1-5}
}
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. 

Topics from this paper

WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation
This report describes the issues surrounding big data security and privacy and provides a summary of the National Science Foundation sponsored workshop on this topic held in Dallas, Texas onExpand
Privacy-Preserving Data Mining: Development and Directions
TLDR
The privacy problem as a form of inference problem and the notion of privacy constraints are viewed and an approach for privacy constraint processing is described and its relationship to privacy-preserving data mining is discussed. Expand
Privacy-Preserving Data Mining : Developments and Directions
This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In particular, we viewExpand
BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17 , 2014 The University of Texas at Dallas
This report describes the issues surrounding big data security and privacy and provides a summary of the National Science Foundation sponsored workshop on this topic held in Dallas, Texas onExpand
On the Complexity of the Privacy Problem in Databases
TLDR
The privacy problem is viewed as a form of inference problem in databases and a theory is developed based on deductive databases that proves some properties of the problem. Expand
Managing Threats to Web Databases and Cyber Systems
This chapter provides an overview of some of the cyber threats information systems as well as data management systems and then discusses potential solutions and challenges. The threats include accessExpand
Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper
TLDR
A comprehensive framework where the privacy and utility of multiple privacy-preserving techniques could be measured is needed to determine the extent to which these techniques, tools and systems reduce practical privacy risks. Expand
Security and privacy for multimedia database management systems
TLDR
This paper describes access control for multimedia database management systems and describes security policies and security architectures for such systems. Expand
Big Data – Security with Privacy Response to RFI for National Privacy Research Strategy
This document provides a summary of the discussions on big data security and privacy at the NSF Workshop on this topic held at the University of Texas at Dallas on September 16 and 17, 2014. ThisExpand
Directions for security and privacy for semantic e-business applications
Developing secure semantic e-business applications requires focusing first on securing the Semantic Web, knowledge management, and e-business processes.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 41 REFERENCES
SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING
TLDR
This position paper discusses possible problems and solutions in data mining, and outlines ideas for further research in this area. Expand
Defining Privacy for Data Mining
TLDR
This paper provides a framework and metrics for discussing the meaning of privacy preserving data mining, as a foundation for further research in this field. Expand
Using Sample Size to Limit Exposure to Data Mining
TLDR
This paper shows how lower bounds from pattern recognition theory can be used to determine sample sizes where data mining tools cannot obtain reliable results. Expand
Privacy Preserving Data Mining
TLDR
This work considers a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information, and proposes a protocol that is considerably more efficient than generic solutions and demands both very few rounds of communication and reasonable bandwidth. Expand
Privacy preserving mining of association rules
TLDR
A class of randomization operators are proposed that are much more effective than uniform randomization in limiting the breaches of privacy breaches and derived formulae for an unbiased support estimator and its variance are derived. Expand
Security checking in relational database management systems augmented with inference engines
TLDR
The notion of multilevel security and the difficulties encountered in designing an implementation scheme for a security policy for a multileVEL secure database management system (MLS/DBMS) are discussed and difficulties may be overcome in augmenting a database with an inference engine so that it functions like a knowledge based system. Expand
Security and inference in multilevel database and knowledge-base systems
TLDR
This paper establishes a framework for studying these inference control problems, describes a representation for relevant semantics of the application, develops criteria for safety and security of a system to prevent these problems, and outlines algorithms for enforcing these criteria. Expand
Security Constraints in a Multilevel Secure Distributed Database Management System
TLDR
Techniques for processing security constraints in a distributed environment during query, update, and database design operations are described by this work. Expand
Security Constraint Processing in a Multilevel Secure Distributed Database Management System
In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels.Expand
Design and Implementation of a Database Inference Controller
TLDR
This paper describes the design and prototype development of an Inference Controller for a MLS/DBMS that functions during query processing and describes some extensions to the inference controller so that an integrated solution can be provided to the problem. Expand
...
1
2
3
4
5
...