Abstract
Recently, data mining with capability of preserving privacy has been an area gaining a lot of researcher attention. In fact, researchers working on inference control in statistical databases have long raised a number of related concerns. In the literature, different approaches have been proposed, including the cryptographically secure multiparty computation, random perturbation, and generalization.
Nowadays, the main data mining tasks include association rule mining, classification, clustering and so on. According to different mining missions, there are different privacy-preserving data mining algorithms.
This chapter is organized as follows. Section 14.1 presents the application for privacy-preserving association rule mining. In Section 14.2 privacy-preserving clustering is discussed. In Section 14.3, we give a scheme to privacy-preserving collaborative data mining. In Section 14.4, we introduce the evaluation of privacy preserving and future work. Finally, the conclusion is presented in Section 14.5.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmad W, Khokhar A (2007) An architecture for privacy preserving collaborative filtering on web portals. In: Proceedings of the 3rd International Symposium on Information Assurance and Security, pp 273–278, 29–31 August 2007
Agrawal R, Srikant R (2000) Privacy-Preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp 939–450, Dallas, TX, May 2000
Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: P. Buneman and S. Jajodia (eds) Proceedings of ACM SIGMOD Conference on Management of Data, pp 207–216, Washington DC, May 1993
Clifton C (2005) What is privacy? Critical steps for privacy-preserving data mining. In: IEEE ICDM Workshop on Security and Privacy Accepts of Data Mining, Houston, TX, 27–30 November 2005
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy preserving distributed data mining. ACM SIGKDD Explor Newslett 4(2):28–34
Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Info Theory 31(4):469–472
Evfimievski A, Srikant R, Agrawal R, Gehrke J (2002) Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, Edmonton, Alberta, Canada, pp 217–228, July 2002
Gennaro R, Rabin M, Rabin T (1998) Simplified VSS and fact-track multiparty computations with applications to threshold cryptography. In: Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing, pp 101–111
Jha S, Kruger L, McDaniel P (2005) Privacy preserving clustering (LNCS 3679). Springer, Berlin Heidelberg New York
Kantarcioglu M, Clifton C (2002) Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: Proceedings of ACM SIGKDDW Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD)
Li XB, Sarkar S (2006) A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans Know Data Eng 18(19):1278–1283
Oliveira SRM, Zaiane OR (2002) Privacy preserving frequent itemset mining. In: Workshop on Privacy, Security, and Data Mining at the 2002 IEEE International Conference on Data Mining (ICDM’02), Maebashi City, Japan
Oliveira SRM, Zaiane OR (2004) Achieving privacy preservation when sharing data for clustering. In: Proceedings of the International Workshop on Secure Data Management in a Connected World (SDM’04) in conjunction with VLDB 2004, Toronto, Canada. August 2004
Rizvi S, Haritsa JR (2002) Maintaining data privacy in association rule mining. In: Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China. August 2002
Shaneck M, Kim Y, Kumar V (2006) Privacy preserving nearest neighbor search. In: Proceedings of the 6th IEEE International Conference on Data Mining Workshops (ICDMW’06), 2006
Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, Edmonton, Alberta, Canada
Vaidya J, Clifton C (2003) Privacy preserving k-means clustering over vertically partitioned data. In: SIGKDD ’03, Washington DC, pp 206–214
Verykios V, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1):50–57
Wu CW (2005) Privacy preserving data mining with unidirectional interaction. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2005), 23–26 May 2005, pp 5521–5524
Wu X, Chu CH, Wang Y, Liu F, Yue D (2007) Privacy preserving data mining research: current status and key issues. Lecture Notes Comput Sci 4489:762–772
Zhan J, Matwin S (2006) A crypto-based approach to privacy-preserving collaborative data mining. In: Proceedings of the 6th IEEE International Conference on Data Mining Workshops (ICDMW’06), December 2006, pp 546–550
Zhu J (2009) A new scheme to privacy-preserving collaborative data mining. In: Proceedings of the 5th International Conference on Information Assurance and Security, Xi’an China, 2009
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer
About this chapter
Cite this chapter
Yin, Y., Kaku, I., Tang, J., Zhu, J. (2011). Application for Privacy-preserving Data Mining. In: Data Mining. Decision Engineering. Springer, London. https://doi.org/10.1007/978-1-84996-338-1_14
Download citation
DOI: https://doi.org/10.1007/978-1-84996-338-1_14
Publisher Name: Springer, London
Print ISBN: 978-1-84996-337-4
Online ISBN: 978-1-84996-338-1
eBook Packages: EngineeringEngineering (R0)