Abstract
Privacy-preserving data mining (PPDM) is one of the newest trends in privacy and security research. It is driven by one of the major policy issues of the information era: the right to privacy.
Data mining is the process of automatically discovering high-level data and trends in large amounts of data that would otherwise remain hidden. The datamining process assumes that all the data is easily accessible at a central location or through centralized access mechanisms such as federated databases and virtual warehouses. However, sometimes the data are distributed among various parties. Privacy in terms of legal and commercial concerns may prevent the parties from directly sharing some sensitive data. Sensitive data usually includes information regarding individuals’ physical or mental health, financial privacy, etc. Privacy advocates and data mining are frequently at odds with each other, and bringing the data together in one place for analysis is not possible due to the privacy laws or policies. How parties collaboratively conduct data mining without breaching data privacy presents a major challenge. The problem is not data mining itself, but the way data mining is done. In this chapter, some techniques for PPDM are introduced.
This chapter is organized as follows. Section 6.1 introduces the issues about privacy and data mining. Section 6.2 discusses the relationship between security, privacy and data mining. Section 6.3 introduces the foundation for PPDM. Section 6.4 discusses the collusion behaviors in PPDM. Concluding remarks are given in the Section 6.5.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abraham I, Dolev D, Gonen R, Halpern J (2006) Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: PODC 2006, pp 53–62, Denver, CO
Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceeding of the 2000 ACM SIGMOD Conference on Management of Data, pp 439–450, Dallas, TX, 14–19 May 2000
Agrawal R, Terzi E (2006) On honesty in sovereign information sharing. In: EDBT’06, pp 240–256, Munich, Germany, March 2006
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy preserving distributed data mining. SIGKDD Explor 4(2):28–34
Ge X, Zhu J (2009) Collusion-resistant protocol for privacy-preserving distributed association rules mining. In: Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China
Guo S (2007) Analysis of and techniques for privacy preserving data mining. PhD thesis, University of North Carolina at Charlotte, 2007
Jiang W, Clifton C (2006) Transforming semi-honest protocols to ensure accountability. In: PADM’06, pp 524–529, Hong Kong, China, 2006
Kargupta H, Das K, Liu K (2007) Multi-party, privacy-preserving distributed data mining using a game theoretic framework. In: PKDD, vol 4702, Lecture Notes in Computer Science, pp 523–531. Springer, Berlin Heidelberg New York
Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Advances in Cryptology. CRYPTO 2000, pp 36–54, 20–24 August 2000. Springer, Berlin Heidelberg New York
Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptology 15(3):177–206
Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Privacy Confident 1(1):59–98
Liu K (2007) Multiplicative data perturbation for privacy preserving data mining. PhD thesis, University of Maryland Baltimore County, Baltimore, MD, 2007
Liu L (2008) Perturbation based privacy preserving data mining techniques for real-world data. PhD thesis, University of Texas at Dallas, 2008
Oliveira SM (2005) Data transformation for privacy-preserving data mining. PhD thesis, University of Alberta, Edmonton, Alberta, 2005
Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Know Data Eng 13(6):1010–1027
Shaneck M (2007) Privacy preserving nearest neighbor search and its applications. PhD thesis, University of Minnesota, 2007
Vaidya JS (2004) Privacy preserving data mining over vertically partitioned data. PhD thesis, Purdue University, 2004
Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science
Yao AC (1986) How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp 162–167, Toronto, Ontario, Canada, 27–29 Oct 1986
Zhan J (2008) Privacy-preserving collaborative data mining. IEEE Comput Intell 3:31–41
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer
About this chapter
Cite this chapter
Yin, Y., Kaku, I., Tang, J., Zhu, J. (2011). Privacy-preserving Data Mining. In: Data Mining. Decision Engineering. Springer, London. https://doi.org/10.1007/978-1-84996-338-1_6
Download citation
DOI: https://doi.org/10.1007/978-1-84996-338-1_6
Publisher Name: Springer, London
Print ISBN: 978-1-84996-337-4
Online ISBN: 978-1-84996-338-1
eBook Packages: EngineeringEngineering (R0)