Abstract
Proper data protection facilities and services are very important in organizations. Data security and privacy issues needs to be considered and applied in organizations to provide a successful business operation. Large organizations have adapted the implementation and application of policies related to data security and privacy as one of their core and important activities. Data classification process allows financial organizations to organize their data according to their needs. However data classification is a laborious activity with significant data to evaluate and categorize. Data classification process is needed for organizations to identify and apply appropriate policy and security settings such as private access control and encryption requirements. In this paper a fuzzy logic based classification is used to classify data and suggests a method that can determine requirements for data security and privacy in organizations based on organizational needs and government policies imposed on data. A new method for data access authorization is also developed based on fuzzy logic, which will assist in preserving privacy and security of data. A Case study is considered to present the effectiveness of the proposed methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhou H, Koong K. S, Xiong Y (2007) Accounting standards and quality of earnings information: evidence from an emerging economy, International Journal of Electronic Finance Vol. 1, No.3, pp. 355–372
Smith A. D (2006) Exploring security and comfort issues associated with online banking, International Journal of Electronic Finance Vol. 1, No.1, pp. 18–48
De Capitani di Vimercati S, Foresti S, Samarati S (2008) Recent Advances in Access Control”, in Handbook of Database Security – Applications and Trends, M. Certz, S. Jajodia (Editors), Springer, USA
Certz M, Jajodia S (2008) Security Re-engineering for Databases: Concepts and Techniques, in Handbook of Database Security – Applications and Trends, M. Certz, S. Jajodia (Editors), Springer, USA
Kamra A, Terzi E, Bertino E (2007) Detecting anomalous access patterns in relational databases, The VLDB Journal, Springer, Germany, pp 1063–1077
Chung M, Gertz M, Levitt M (2000) Demids: a misuse detection system for database systems. In: Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control”, IFIP TC11 WG11.5 Third Working Conference, 2000
Spalka A, Lehnhardt J (2005) A comprehensive approach to anomaly detection in relational databases” DBSec, pp. 207–221
Yao Q, An Q, Huang Q (2005) Finding and analyzing database user sessions, Proceedings of the 10th International Conference on Database Systems for Advanced Applications (DASFAA), 2005
Clark D. L (2003) Enterprise Security – The manager’s defense guide, Addison-Wesley, USA
McGraw G (2006) Software Security, Addison-Wesley, USA
Hosmer H. H (1993) Using Fuzzy Logic to Represent Security Policies in the Multipolicy Paradigm, ACM SIGSAC Review
Choi Y. B, Crowgey R. L, Price J. M, VanPelt J. S (2006) The state-of-the-art of mobile payment architecture and emerging issues, International Journal of Electronic Finance Vol. 1, No.1, pp. 94–103
Mohammadian M, Hatzinakos D (2009) Data classification process for security and privacy based on a fuzzy logic classifier, International Journal of Electronic Finance Volume 3 Issue 4, pp 374–386
Zadeh L. A (1965) Fuzzy sets", Information and control, Vol. 8. pp 338–352
Bojadziev G, Bojadziev M (2007) Fuzzy Logic for Business, Finance and Management 2nd Ed, World Sceintific, Singapore
Kosko B (1992) Neural networks and fuzzy systems, a dynamic system, Prentice-Hall: Englewood Cliff
Ferraiolo D. F, Kuhn D. R (1992) Role Based Access Control, 15th National Computer Security Conference, USA, 1992
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Mohammadian, M., Hatzinakos, D. (2013). An Adaptive Intelligent Fuzzy Logic Classifier for Data Security and Privacy in Large Databases. In: Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., Hatzinakos, D. (eds) SmartData. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6409-9_15
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6409-9_15
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6408-2
Online ISBN: 978-1-4614-6409-9
eBook Packages: Computer ScienceComputer Science (R0)