+ All Categories
Home > Documents > Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for...

Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for...

Date post: 27-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
32
Privacy Overview and Data Mining CSC 301 Spring 2018 Howard Rosenthal
Transcript
Page 1: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

PrivacyOverviewandDataMining

CSC301Spring2018

HowardRosenthal

Page 2: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

CourseNotes:

� Muchofthematerialintheslidescomesfromthebooksandtheirassociatedsupportmaterials,belowaswellasmanyofthereferencesattheclasswebsite

Baase,SaraandHenry,Timothy,AGiftofFire:Social,Legal,andEthicalIssuesforComputingTechnology(5thEdition)Pearson,March9,2017,ISBN-13:978-0134615271Quinn,Michael,EthicsfortheInformationAge(7thEdition),Pearson,Feb.21,2016,ISBN-13978-0134296548

2

Page 3: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

LessonGoals

�  Basicprinciplesinprivacy�  Definingprivacy�  Threatstoprivacy�  Impactsoftechnologyonprivacy�  Securingpersonalprivacy� Technologyexcursion–DataMining

3

Page 4: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

4

Page 5: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

ThereAreManyAspectsToSecurityandPrivacy

5

Page 6: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

WhatIsPrivacy?�  IsprivacyaNaturalRight

�  Isprivacyatypeofproperty?�  Ifyouinvadeaperson’sprivacyitcanbeamajorcoerciveforce

�  Privacyusedtobefairlysimple�  Yourhomecouldnotbeinvaded,noryourpropertyseized,without

dueprocess�  Todayyourprivateinformationiseverywhere

�  Onthenet�  Onyourphone�  Onyourcomputer�  Inthecloud�  Inyouremployer’sdatabases�  Withthegovernment

�  Evenifthepeopleyougiveinformationtodonotmisusethatinformation,theinformationismoresusceptibletotheftviahackingorothermischiefthaneverbefore�  RecentlytheFederalGovernment’sOfficeofPersonalManagement

washackedanddetailedinformationoneveryonewithasecurityclearancewasstolen

�  Governmentacceptedverylittleresponsibilityforthistheft6

Page 7: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

ThereAreThreeKeyAspectsToPrivacy�  Freedomfromintrusion� Controloverinformationaboutoneself�  Freedomfromsurveillance(physical,electronic,etc.)

7

Page 8: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

OurPrivacyIsAlwaysBeingThreatened�  Therearemanythreatstoourprivacy

�  Intentionaluseormisuseofinformationbybusinessesorgovernment

�  Unauthorizedreleasetoinsidersbyinformationmaintainers�  Theftofinformationbycriminalsorhostilegovernments�  Inadvertentleakagethroughnegligenceorcarelessness

�  Ourownactions,suchaspostingtoomuchdataontheInternetforeitherbenign(B)ormalicious(M)purposes�  Givetoonecharityandtenotherswillcomeknocking(B)�  Listof“offcolor”moviesyoumayhavewatched(M)-usedtodiscredityou

�  Divorceproceeding(M)–sometimesusedbypoliticians�  Stealingfinancialdata(M)–usedtoopenloans,buyhomes,etc.allinyourname

8

Page 9: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

9

Page 10: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

NewTechnologyCreatesManyNewOpportunitiesToInvadeOurPrivacy�  Someofthesethreatscombinebothlowtechtechniques,suchas

eavesdroppingorlookingoverashoulder,withhightechtechniques�  Governmentandprivatedatabases�  Sophisticatedtoolsforsurveillanceanddataanalysis�  Vulnerabilityofdata

�  Searchenginescollectmanyterabytesofdatadaily.�  Dataisanalyzedtotargetadvertisinganddevelopnewservices.�  Whogetstoseethisdata?Whyshouldwecare?�  Thissamedata,whenaggregated,createsadetailedbiographyofyou�  Datacollectedforonepurposewillfindotheruses�  Assumethateverythingincyberspaceisrecordedandreplicated

�  Youcreatenewpotentialsecurityleakseveryday�  Facebook�  E-mails�  Texts�  Mapinstructions�  Twitter�  IfinformationisonapublicWebsite,itisavailabletoeveryone

�  Ifyoupostpicturesofyourvacationwhileyouareonityoumaycomehometoanemptyhouse

10

Page 11: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

Re-identification

�  Re-identificationistheprocessofidentifyingindividualsusinganonymousdata.�  Re-identificationhasbecomemucheasierduetothequantityofinformationandpowerofdatasearchandanalysistools

�  Acollectionofsmallitemscanbeaggregatedtoprovideadetailedpicture

�  Yoursearchhistorycouldidentifywhoyouare.�  Workingbackwardsfromthemetadataisoftenpossiblewithenoughcomputingpoweranddata.

�  Reportersoftenuseanonymousdataastheyworktowardsidentifyingindividuals.

�  IfinformationisonapublicWebsite,itisoftenavailabletoeveryone

11

Page 12: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

PersonalSecurityandPrivacyAreOftenThreatenedByOurOwnActions

12

Page 13: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

EverythingYouAccessMayBeMonitored�  SearchEngines

�  Mayrecordallyoursearches�  IfyousearchforabookonAmazonyou’llgete-mailsaboutthatbookor

otherseveryfewdays�  Someofyoursearchesyoumaywanttokeepprivate

�  Lookingforanewjob�  Searchingforcertainspecificproducts�  Medicalsearches

�  Smartphones�  Areoftentransmittinglocationdata

�  Greatifaphoneislostorstolen�  Horribleifahousethiefgetsthedata

�  Passwordsandcodesforkeyaccountsareoftenstoredwithoutyourknowledgeandthenuploadedtothecloudwithotherdata�  Ifthecloudishackedyourinformationmaybeonthemarketwithoutyour

knowledge�  Contactlistscanbecompromised�  Photosmaybegatheredandsubjectedtovariousformsofanalysis

�  Software�  Manypiecesofsoftwarerecordalltypesofdata�  Thisdatamayultimatelybecollectedandanalyzed�  Sometimesitsimplysitsforgottenuntilsomeonedecidestoseewhat’sthere

13

Page 14: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

ManagingPersonalData–TerminologyandPrinciples(1)�  Personalinformationisanyinformationrelatingtoanindividualperson

�  Invisibleinformationgathering�  Datacollectedwithoutyourknowledge

�  Alwaysreadthefineprint�  Howoftendoyouclickagreewhendownloading?

�  Thisisanethicalissue�  Cookies

�  FilesaWebsitestoresonavisitor’scomputer�  Secondaryuse

�  Useofpersonalinformationforapurposeotherthanthepurposeforwhichitwasprovided�  Saleofconsumerinformationyoumarketersorotherbusinesses�  Useofinformationinvariousdatabasestodenysomeoneajob�  UseofvehicleregistrationsbytheIRStofindpersonswithhigh

incomes�  Useoftextmessagestoprosecuteforacrime�  Usingyourinformationinanillegalmannerafterstealingorgleaningit

fromlegitimatesources

14

Page 15: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

ManagingPersonalData–TerminologyandPrinciples(2)� Datamining

�  Searchingandanalyzingmassesofdatatofindpatternsanddevelopnewinformationorknowledge

� Computermatching�  Combiningandcomparinginformationfromdifferentdatabases(usingsocialsecuritynumber,forexample)tomatchrecords.

� Computerprofiling�  Analyzingdatatodeterminecharacteristicsofpeoplemostlikelytoengageinacertainbehavior

15

Page 16: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

InformedConsentProvidesAnEthicalFrameworkForInformationCollection�  InformedConsent

�  Youmustagreebeforeyourinformationcanbecollectedorused�  Couldbeusedtopressureyouifyouaredeniedaservicewithout

agreeingtosharethisdata�  LoJackcollectsinformationaboutyourcarlocationcontinuously–

wasthisinformedconsent�  TheAAAtriedcollectinginformationbyaskingyouifyou’dliketo

hookdatacollectorsintoyourcar–thentheyreportedthatdatatotheinsurancesideofthehouse

�  Twocommonformsforprovidinginformedconsentareoptoutandoptin:�  Inoptoutapersonmustrequest(usuallybycheckingabox)that

anorganizationnotuseinformation.�  Inoptinthecollectoroftheinformationmayuseinformationonly

ifpersonexplicitlypermitsuse(usuallybycheckingabox).�  DiscussionQuestion:

�  Haveyouseenopt-inandopt-outchoices?Where?Howweretheyworded?Wereanyofthemdeceptive?

16

Page 17: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

FairInformationPrinciples�  Abasicsetofprinciplesforbusinessestohandledatainanethicalway�  Informpeoplewhenyoucollectdata�  Collectonlythedatathatisneeded�  Makeoptinyourdefault�  Offeroptoutmethodsthatcanbeusedatanytime

�  Itishardertoensureifalldataisdeletedifyouoptinandthenoptout

�  Keepdataonlyaslongasisneed�  Maintainaccuracyofdata�  Protectthedata.Useallreasonablesecuritymethodstodoso.

�  Developpoliciesforrespondingtolawenforcementrequests� Manygovernmentorganizationsaredevelopingguidelines

�  FTCFairInformationPracticePrinciples.pdf

17

Page 18: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

DataMining

18

http://www.tutorialspoint.com/data_mining/dm_quick_guide.htm

Page 19: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

WhatIsDataMining?

�  Dataminingisdefinedasextractinginformationfromhugesetsofdata.�  Inotherwords,wecansaythatdataminingistheprocedureof

miningknowledgefromdata.�  Dataminingcanintegratemanydifferentdatasets

�  Theinformationorknowledgeextractedfromdataminingcanbeusedforanyofthefollowingapplications�  Profiling–Thisiswhereprivacyreallygetsinvolved�  CustomerRetention�  PatternAnalysis�  MarketAnalysis�  FraudDetection�  ProductionControl�  ScienceExploration

19

Page 20: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

DataMiningTasks�  Dataminingdealswiththekindofpatternsthatcanbemined.Onthebasisofthekindofdatatobemined,therearetwocategoriesoffunctionsinvolvedinDataMining−�  TheDescriptiveFunctiondealswiththegeneralpropertiesofdata

inthedatabase.�  Class/ConceptDescription�  MiningofFrequentPatterns�  MiningofAssociations�  MiningofCorrelations�  MiningofClusters

�  ClassificationandPredictionistheprocessoffindingamodelthatdescribesthedataclassesorconcepts.Thepurposeistobeabletousethismodeltopredicttheclassofobjectswhoseclasslabelisunknown.Thisderivedmodelisbasedontheanalysisofsetsoftrainingdata.Thederivedmodelcanbepresentedinthefollowingforms−�  Classification(IF-THEN)Rules�  DecisionTrees�  MathematicalFormulae�  NeuralNetworks

20

Page 21: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

DescriptiveTasksInDataMining(1)�  TheClass/ConceptDescriptionreferstothedatatobeassociatedwiththe

classesorconcepts.Forexample,inacompany,theclassesofitemsforsalesincludecomputerandprinters,andconceptsofcustomersincludebigspendersandbudgetspenders.Suchdescriptionsofaclassoraconceptarecalledclass/conceptdescriptions.Thesedescriptionscanbederivedbythefollowingtwoways−�  DataCharacterizationreferstosummarizingdataofclassunderstudy.This

classunderstudyiscalledasTargetClass.�  DataDiscriminationreferstothemappingorclassificationofaclasswith

somepredefinedgrouporclass.�  MiningofFrequentPatternslooksatpatternsarethosepatternsthatoccur

frequentlyintransactionaldata.Thelistofkindoffrequentpatternsincludes�  TheFrequentItemSetisasetofitemsthatfrequentlyappeartogether,for

example,milkandbread.�  TheFrequentSubsequenceisasequenceofpatternsthatoccurfrequently

suchaspurchasingacameraisfollowedbymemorycard.�  TheFrequentSubStructurereferstodifferentstructuralforms,suchas

graphs,trees,orlattices,whichmaybecombinedwithitem−setsorsubsequences.

21

Page 22: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

DescriptiveTasksInDataMining(2)�  MiningofAssociation

�  Thisprocessreferstotheprocessofuncoveringtherelationshipamongdataanddeterminingassociationrules.

�  Associationsareusedinretailsalestoidentifypatternsthatarefrequentlypurchasedtogether,helpingtoidentifypotentialbuyers�  Forexample,aretailergeneratesanassociationrulethatshowsthat70%oftime

milkissoldwithbreadwhileonly30%oftimesarebiscuitssoldwithbread.�  MiningofCorrelations

�  Additionalanalysisperformedtouncoverinterestingstatisticalcorrelationsbetweenassociated-attribute−valuepairsorbetweentwoitemsetstoanalyzethatiftheyhavepositive,negativeornoeffectoneachother.

�  Wanttounderstandifthereisactualcausation�  MiningofClusters

�  Clusterreferstoagroupofsimilarkindofobjects.�  Clusteranalysisreferstoforminggroupofobjectsthatareverysimilar

toeachotherbutarehighlydifferentfromtheobjectsinotherclusters.

�  Cangroupbygender,age,homelocation,language,….

22

Page 23: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

ClassificationandPredictionFunctions

�  Classification−Itpredictstheclassofobjectswhoseclasslabelisunknown.Itsobjectiveistofindaderivedmodelthatdescribesanddistinguishesdataclassesorconcepts.TheDerivedModelisbasedontheanalysissetoftrainingdatai.e.thedataobjectwhoseclasslabeliswellknown.

�  Prediction−Itisusedtopredictmissingorunavailablenumericaldatavaluesratherthanclasslabels.RegressionAnalysisisgenerallyusedforprediction.Predictioncanalsobeusedfordistributiontrendsbasedonavailabledata.

�  OutlierAnalysis−Outliersmaybedefinedasthedataobjectsthatdonotcomplywiththegeneralbehaviorormodelofthedataavailable.

�  EvolutionAnalysis−Evolutionanalysisreferstothedescriptionandmodelregularitiesortrendsforobjectswhosebehaviorchangesovertime.

23

Page 24: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

DataWarehousing

� Datawarehousingistheprocessofconstructingandusingthedatawarehouse.Adatawarehouseisconstructedbyintegratingthedatafrommultipleheterogeneoussources.Itsupportsanalyticalreporting,structuredand/oradhocqueries,anddecisionmaking.� Datawarehousinginvolvesdatacleaning,dataintegration,anddataconsolidations.Tointegrateheterogeneousdatabases,wehavethefollowingtwoapproaches−�  QueryDrivenApproach�  UpdateDrivenApproach

24

Page 25: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

QueryDrivenApproach

�  Thisisthetraditionalapproachtointegrateheterogeneousdatabases.�  Buildswrappersandintegratorsontopofmultipleheterogeneous

databases.Theseintegratorsarealsoknownasmediators.�  TheprocessoftheQueryDrivenApproach

�  Whenaqueryisissuedtoaclientside,ametadatadictionarytranslatesthequeryintooneormorequeries,appropriatefortheindividualheterogeneoussiteinvolved.

�  Nowthesequeriesaremappedandsenttothelocalqueryprocessor.�  Theresultsfromheterogeneoussitesareintegratedintoaglobal

answerset.�  Advantages

�  Governmentdoesn’tgettokeepalargedatabaseofinformationonpermanentfile

�  Don’tneedtomaintainalargeITinfrastructure�  Disadvantages

�  TheQueryDrivenApproachneedscomplexintegrationandfilteringprocesses.�  Itisveryinefficientandveryexpensiveforfrequentqueries.�  Thisapproachisexpensiveforqueriesthatrequireaggregations(constant

regrouping)ofdata

25

Page 26: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

UpdateDrivenApproach�  Today'sdatawarehousesystemsfollowupdate-drivenapproachratherthan

thetraditionalapproachdiscussedearlier.�  Intheupdate-drivenapproach,theinformationfrommultipleheterogeneous

sourcesisintegratedinadvanceandstoredinawarehouse.�  Thisincludesdatascrubbing–theprocessofvalidatingdataforcorrectnessin

advance�  Thisinformationisavailablefordirectqueryingandanalysis.�  Advantages

�  Thisapproachprovideshighperformance.�  Thedatacanbecopied,processed,integrated,annotated,summarizedand

restructuredinthesemanticdatastoreinadvance.�  Inotherwords,westoredataintheway(s)wewanttolookatit

�  Queryprocessingdoesnotrequireaninterfacewiththeprocessingatthelocaloriginaldatasources.�  Muchlessintrusiveandresourceintensivetopullthedataonce,ratherthanwhenever

youwanttoquery�  Disadvantages

�  Mustmaintainalargeinfrastructuretoimport,storeandmaintaindata�  Privacyconcernssincethegovernmentnowhasaccesstosomuchdata

�  ThewholedebateonthePatriotActcenteredaroundwhetherornotthegovernmentcouldcontinuouslycollectandstoremetadatafromtheISPsandcell/land-linephoneproviders�  Apolitical/privacyargumentconflictedwithatechnicalargument

26

Page 27: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

DataWarehousingandDataMining�  OnlineAnalyticalMiningintegrateswithOnlineAnalyticalProcessing

todiscoverknowledgeacrossmultidimensionaldatabases.

27

Page 28: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

On-lineAnalyticalMining

�  On-lineAnalyticalMining(OLAM)hasthefollowingimportantattributes�  Highqualityofdataindatawarehouses

�  Thedataminingtoolsarerequiredtoworkonintegrated,consistent,andcleaneddatawhichareverycostlyinthepreprocessingofdata.

�  ThedatawarehousesconstructedbysuchpreprocessingarevaluablesourcesofhighqualitydataforOLAPanddataminingaswell.

�  Acomplexinformationprocessinginfrastructuresurroundseachdatawarehouses�  Informationprocessinginfrastructurereferstoaccessing,integration,

consolidation,andtransformationofmultipleheterogeneousdatabases,web-accessingandservicefacilities,reportingandOLAPanalysistools.

�  On-lineAnalyticalProcessing(OLAP)−basedexploratorydataanalysis�  Exploratorydataanalysisisrequiredforeffectivedatamining.�  OLAPprovidesfacilitiesfordataminingonvarioussubsetofdataandat

differentlevelsofabstraction.�  Onlineselectionofdataminingfunctions

�  IntegratingOLAPwithmultipledataminingfunctionsandonlineanalyticalminingprovidesuserswiththeflexibilitytoselectdesireddataminingfunctionsandswapdataminingtasksdynamically.

28

Page 29: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

StepsInDataMining�  DataCleaning

�  Thenoiseandinconsistentdataisremoved.�  DataIntegration

�  Multipledatasourcesarecombined.�  DataSelection

�  Datarelevanttotheanalysistaskareretrievedfromthedatabase.�  DataTransformation

�  Dataistransformedorconsolidatedintoformsappropriateforminingbyperformingsummaryoraggregationoperations.

�  DataMining�  Intelligentmethodsareappliedinordertoextractdatapatterns.

�  PatternEvaluation�  Datapatternsareevaluated.

�  KnowledgePresentation�  Knowledgeisrepresented,oftengraphically

29

Page 30: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

30

TheProcessofKnowledgeDiscovery

Page 31: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

Multi-DimensionalDatabases

� Multidimensionalstructuresuseavariationoftherelationalmodeltoorganizedataandexpresstherelationshipsbetweendata.� Morecomplexthanthetypicalrow/columnrelationaldatabase.Eachcellwithinamultidimensionalstructurecontainsaggregateddatarelatedtoelementsalongeachofitsdimensions

�  Timeisanadditionaldimensionusedintheanalysisofdata

31

Page 32: Privacy Overview and Data Mining CSC 301 Spring 2018 ... · CSC 301 Spring 2018 ... Internet for either benign (B) or malicious (M) purposes ... Classification − It predicts the

ExampleOfAMulti-DimensionalDatabaseStructure

32


Recommended