Skip to main content

An Adaptive Intelligent Fuzzy Logic Classifier for Data Security and Privacy in Large Databases

  • Conference paper
  • First Online:
SmartData

Abstract

Proper data protection facilities and services are very important in organizations. Data security and privacy issues needs to be considered and applied in organizations to provide a successful business operation. Large organizations have adapted the implementation and application of policies related to data security and privacy as one of their core and important activities. Data classification process allows financial organizations to organize their data according to their needs. However data classification is a laborious activity with significant data to evaluate and categorize. Data classification process is needed for organizations to identify and apply appropriate policy and security settings such as private access control and encryption requirements. In this paper a fuzzy logic based classification is used to classify data and suggests a method that can determine requirements for data security and privacy in organizations based on organizational needs and government policies imposed on data. A new method for data access authorization is also developed based on fuzzy logic, which will assist in preserving privacy and security of data. A Case study is considered to present the effectiveness of the proposed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou H, Koong K. S, Xiong Y (2007) Accounting standards and quality of earnings information: evidence from an emerging economy, International Journal of Electronic Finance Vol. 1, No.3, pp. 355–372

    Article  Google Scholar 

  2. Smith A. D (2006) Exploring security and comfort issues associated with online banking, International Journal of Electronic Finance Vol. 1, No.1, pp. 18–48

    Google Scholar 

  3. De Capitani di Vimercati S, Foresti S, Samarati S (2008) Recent Advances in Access Control”, in Handbook of Database Security – Applications and Trends, M. Certz, S. Jajodia (Editors), Springer, USA

    Google Scholar 

  4. Certz M, Jajodia S (2008) Security Re-engineering for Databases: Concepts and Techniques, in Handbook of Database Security – Applications and Trends, M. Certz, S. Jajodia (Editors), Springer, USA

    Google Scholar 

  5. Kamra A, Terzi E, Bertino E (2007) Detecting anomalous access patterns in relational databases, The VLDB Journal, Springer, Germany, pp 1063–1077

    Google Scholar 

  6. Chung M, Gertz M, Levitt M (2000) Demids: a misuse detection system for database systems. In: Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control”, IFIP TC11 WG11.5 Third Working Conference, 2000

    Google Scholar 

  7. Spalka A, Lehnhardt J (2005) A comprehensive approach to anomaly detection in relational databases” DBSec, pp. 207–221

    Google Scholar 

  8. Yao Q, An Q, Huang Q (2005) Finding and analyzing database user sessions, Proceedings of the 10th International Conference on Database Systems for Advanced Applications (DASFAA), 2005

    Google Scholar 

  9. Clark D. L (2003) Enterprise Security – The manager’s defense guide, Addison-Wesley, USA

    Google Scholar 

  10. McGraw G (2006) Software Security, Addison-Wesley, USA

    Google Scholar 

  11. Hosmer H. H (1993) Using Fuzzy Logic to Represent Security Policies in the Multipolicy Paradigm, ACM SIGSAC Review

    Google Scholar 

  12. Choi Y. B, Crowgey R. L, Price J. M, VanPelt J. S (2006) The state-of-the-art of mobile payment architecture and emerging issues, International Journal of Electronic Finance Vol. 1, No.1, pp. 94–103

    Google Scholar 

  13. Mohammadian M, Hatzinakos D (2009) Data classification process for security and privacy based on a fuzzy logic classifier, International Journal of Electronic Finance Volume 3 Issue 4, pp 374–386

    Article  Google Scholar 

  14. Zadeh L. A (1965) Fuzzy sets", Information and control, Vol. 8. pp 338–352

    Google Scholar 

  15. Bojadziev G, Bojadziev M (2007) Fuzzy Logic for Business, Finance and Management 2nd Ed, World Sceintific, Singapore

    Book  Google Scholar 

  16. Kosko B (1992) Neural networks and fuzzy systems, a dynamic system, Prentice-Hall: Englewood Cliff

    Google Scholar 

  17. Ferraiolo D. F, Kuhn D. R (1992) Role Based Access Control, 15th National Computer Security Conference, USA, 1992

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masoud Mohammadian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Mohammadian, M., Hatzinakos, D. (2013). An Adaptive Intelligent Fuzzy Logic Classifier for Data Security and Privacy in Large Databases. In: Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., Hatzinakos, D. (eds) SmartData. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6409-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6409-9_15

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6408-2

  • Online ISBN: 978-1-4614-6409-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics