Skip to main content

Application for Privacy-preserving Data Mining

  • Chapter
Data Mining

Part of the book series: Decision Engineering ((DECENGIN))

  • 3044 Accesses

Abstract

Recently, data mining with capability of preserving privacy has been an area gaining a lot of researcher attention. In fact, researchers working on inference control in statistical databases have long raised a number of related concerns. In the literature, different approaches have been proposed, including the cryptographically secure multiparty computation, random perturbation, and generalization.

Nowadays, the main data mining tasks include association rule mining, classification, clustering and so on. According to different mining missions, there are different privacy-preserving data mining algorithms.

This chapter is organized as follows. Section 14.1 presents the application for privacy-preserving association rule mining. In Section 14.2 privacy-preserving clustering is discussed. In Section 14.3, we give a scheme to privacy-preserving collaborative data mining. In Section 14.4, we introduce the evaluation of privacy preserving and future work. Finally, the conclusion is presented in Section 14.5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahmad W, Khokhar A (2007) An architecture for privacy preserving collaborative filtering on web portals. In: Proceedings of the 3rd International Symposium on Information Assurance and Security, pp 273–278, 29–31 August 2007

    Google Scholar 

  • Agrawal R, Srikant R (2000) Privacy-Preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp 939–450, Dallas, TX, May 2000

    Google Scholar 

  • Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: P. Buneman and S. Jajodia (eds) Proceedings of ACM SIGMOD Conference on Management of Data, pp 207–216, Washington DC, May 1993

    Google Scholar 

  • Clifton C (2005) What is privacy? Critical steps for privacy-preserving data mining. In: IEEE ICDM Workshop on Security and Privacy Accepts of Data Mining, Houston, TX, 27–30 November 2005

    Google Scholar 

  • Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy preserving distributed data mining. ACM SIGKDD Explor Newslett 4(2):28–34

    Article  Google Scholar 

  • Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Info Theory 31(4):469–472

    Article  MathSciNet  MATH  Google Scholar 

  • Evfimievski A, Srikant R, Agrawal R, Gehrke J (2002) Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, Edmonton, Alberta, Canada, pp 217–228, July 2002

    Google Scholar 

  • Gennaro R, Rabin M, Rabin T (1998) Simplified VSS and fact-track multiparty computations with applications to threshold cryptography. In: Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing, pp 101–111

    Google Scholar 

  • Jha S, Kruger L, McDaniel P (2005) Privacy preserving clustering (LNCS 3679). Springer, Berlin Heidelberg New York

    Google Scholar 

  • Kantarcioglu M, Clifton C (2002) Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: Proceedings of ACM SIGKDDW Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD)

    Google Scholar 

  • Li XB, Sarkar S (2006) A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans Know Data Eng 18(19):1278–1283

    Google Scholar 

  • Oliveira SRM, Zaiane OR (2002) Privacy preserving frequent itemset mining. In: Workshop on Privacy, Security, and Data Mining at the 2002 IEEE International Conference on Data Mining (ICDM’02), Maebashi City, Japan

    Google Scholar 

  • Oliveira SRM, Zaiane OR (2004) Achieving privacy preservation when sharing data for clustering. In: Proceedings of the International Workshop on Secure Data Management in a Connected World (SDM’04) in conjunction with VLDB 2004, Toronto, Canada. August 2004

    Google Scholar 

  • Rizvi S, Haritsa JR (2002) Maintaining data privacy in association rule mining. In: Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China. August 2002

    Google Scholar 

  • Shaneck M, Kim Y, Kumar V (2006) Privacy preserving nearest neighbor search. In: Proceedings of the 6th IEEE International Conference on Data Mining Workshops (ICDMW’06), 2006

    Google Scholar 

  • Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, Edmonton, Alberta, Canada

    Google Scholar 

  • Vaidya J, Clifton C (2003) Privacy preserving k-means clustering over vertically partitioned data. In: SIGKDD ’03, Washington DC, pp 206–214

    Google Scholar 

  • Verykios V, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1):50–57

    Article  Google Scholar 

  • Wu CW (2005) Privacy preserving data mining with unidirectional interaction. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2005), 23–26 May 2005, pp 5521–5524

    Google Scholar 

  • Wu X, Chu CH, Wang Y, Liu F, Yue D (2007) Privacy preserving data mining research: current status and key issues. Lecture Notes Comput Sci 4489:762–772

    Google Scholar 

  • Zhan J, Matwin S (2006) A crypto-based approach to privacy-preserving collaborative data mining. In: Proceedings of the 6th IEEE International Conference on Data Mining Workshops (ICDMW’06), December 2006, pp 546–550

    Google Scholar 

  • Zhu J (2009) A new scheme to privacy-preserving collaborative data mining. In: Proceedings of the 5th International Conference on Information Assurance and Security, Xi’an China, 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer

About this chapter

Cite this chapter

Yin, Y., Kaku, I., Tang, J., Zhu, J. (2011). Application for Privacy-preserving Data Mining. In: Data Mining. Decision Engineering. Springer, London. https://doi.org/10.1007/978-1-84996-338-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-84996-338-1_14

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84996-337-4

  • Online ISBN: 978-1-84996-338-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics