A Real-Time Anti-Data Mining Technique for Dynamic Databases

碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 100 === With the vigorous development of information technology, various novel and superior data mining techniques have been continuously developed. These developments could potentially cause the disclosures of knowledge and privacy of enterprises. In the past, prote...

Full description

Bibliographic Details
Main Authors: Mei-Chun Tsai, 蔡美君
Other Authors: Tung-Shou Chen
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/3j9558
Description
Summary:碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 100 === With the vigorous development of information technology, various novel and superior data mining techniques have been continuously developed. These developments could potentially cause the disclosures of knowledge and privacy of enterprises. In the past, protection technologies proposed for data mining techniques were mostly for static databases, such as, data distribution and data modification. In comparison, the large dynamic database has fast data flows, extremely large amount of data, constant unpredictable changes and requests for immediate responses. Data protection has been focused on existing data to first provide protection to the third element which might result in some data not being protected. This happens when data increases over time but did not go undergo the first time treatment. The privacy data or knowledge of enterprises could be accessed by illegal users which threaten their survival and future development. This is a gap in the protection technique. Currently, there is little research about static database protection. Therefore, this thesis proposed a real-time anti-data mining technique to resolve the existing data mining security problems. The proposed method is a decision tree used to obtain key attributions of tables. The key attributions are used in the horizontal partitioning of the table in order to set the attributing conditions for the partition procedure. Each record is stored according to the attributes to the different table partition. In summary, the proposed concepts are (1) Data layer: many database servers are set up to store data. (2) Protection layer: the partition and recovery procedure are created, data are saved to different storage zones according to the partition conditions of the partition procedure, and the users’ authority could be verified when data is read. (3) Application layer: the user accessed data via application or web system. Real-time protection and recovery processes are provide during the access of data in dynamic database.