DSP CT 3
DSP CT 3
3. What are privacy-preserving algorithms available in data mining? Explain any one.
- Randomized Response: Collects truthful responses and randomized responses to maintain
privacy.
- k-Anonymity: Generalizes or suppresses data so that individuals cannot be re-identified from
the dataset.
- Example: In a dataset, names and specific ages might be replaced with age ranges and
general professions to ensure privacy while still providing useful data for analysis.
- Ways to Audit:
- Manual Auditing: Regularly reviewing logs and reports.
- Automated Tools: Using database auditing tools like Oracle Audit Vault.
- Triggers: Implementing database triggers to log changes.
- Transaction Logs: Analyzing transaction logs for activity monitoring.
- Application Auditing: Embedding auditing features within applications.
4. What is the difference between Oracle Server and SQL Server 2000 in auditing databases?
- Oracle Server:
- Provides comprehensive auditing options including fine-grained auditing, which allows
detailed control over audit records.
- Uses built-in features like Oracle Audit Vault and Database Firewall for enhanced security.
- Implementation:
- Triggers: Set up triggers to log changes to product tables.
- Audit Tables: Create audit tables to store log entries.
- Automated Reports: Generate regular reports for review by database administrators.
```sql
CREATE TRIGGER ProductAudit
ON Products
AFTER INSERT, UPDATE, DELETE
AS
BEGIN
IF EXISTS(SELECT FROM inserted)
BEGIN
INSERT INTO ProductAuditLog (ActionType, ProductID, ChangeTime, UserID)
SELECT 'INSERT/UPDATE', ProductID, GETDATE(), USER_NAME()
FROM inserted;
END
ELSE
BEGIN
INSERT INTO ProductAuditLog (ActionType, ProductID, ChangeTime, UserID)
SELECT 'DELETE', ProductID, GETDATE(), USER_NAME()
FROM deleted;
END
END;
```
- Implementation:
- Triggers: Set up triggers to log changes to payroll tables.
- Audit Tables: Create audit tables to store log entries.
- Access Controls: Implement strict access controls to limit who can view and modify payroll
data.
```sql
CREATE TRIGGER PayrollAudit
ON Payroll
AFTER INSERT, UPDATE, DELETE
AS
BEGIN
IF EXISTS(SELECT FROM inserted)
BEGIN
INSERT INTO PayrollAuditLog (ActionType, EmployeeID, ChangeTime, UserID)
SELECT 'INSERT/UPDATE', EmployeeID, GETDATE(), USER_NAME()
FROM inserted;
END
ELSE
BEGIN
INSERT INTO PayrollAuditLog (ActionType, EmployeeID, ChangeTime, UserID)
SELECT 'DELETE', EmployeeID, GETDATE(), USER_NAME()
FROM deleted;
END
END;
```
These answers provide detailed yet concise information on the various aspects of database
auditing, triggers, and the practical application of auditing through case studies.
Unit IV - Auditing Database Activities
1. Introduction
- This section provides an overview of the importance of auditing database activities to ensure
security, integrity, and compliance. It discusses the need for monitoring database actions to
detect unauthorized access, data breaches, and performance issues.
1. Introduction
- This section introduces the concept of privacy-preserving data mining (PPDM), which aims
to extract useful information from large datasets while protecting the privacy of individuals. It
discusses the importance and challenges of balancing data utility and privacy.
3. General Survey
- Provides an overview of the state-of-the-art techniques and methodologies in PPDM. It
surveys existing literature, tools, and frameworks used to implement privacy-preserving data
mining.
4. Randomization Methods
- Discusses randomization techniques that add controlled noise to data, such as additive and
multiplicative perturbation, to mask individual data points while preserving overall data patterns
for analysis.
7. Curse of Dimensionality
- Addresses the challenges posed by high-dimensional data in PPDM. As the number of
dimensions increases, it becomes more difficult to maintain privacy while ensuring data utility.
This section explores strategies to manage and mitigate these challenges.