Skip to main content

Privacy-preserving Data Mining

  • Chapter
Data Mining

Part of the book series: Decision Engineering ((DECENGIN))

Abstract

Privacy-preserving data mining (PPDM) is one of the newest trends in privacy and security research. It is driven by one of the major policy issues of the information era: the right to privacy.

Data mining is the process of automatically discovering high-level data and trends in large amounts of data that would otherwise remain hidden. The datamining process assumes that all the data is easily accessible at a central location or through centralized access mechanisms such as federated databases and virtual warehouses. However, sometimes the data are distributed among various parties. Privacy in terms of legal and commercial concerns may prevent the parties from directly sharing some sensitive data. Sensitive data usually includes information regarding individuals’ physical or mental health, financial privacy, etc. Privacy advocates and data mining are frequently at odds with each other, and bringing the data together in one place for analysis is not possible due to the privacy laws or policies. How parties collaboratively conduct data mining without breaching data privacy presents a major challenge. The problem is not data mining itself, but the way data mining is done. In this chapter, some techniques for PPDM are introduced.

This chapter is organized as follows. Section 6.1 introduces the issues about privacy and data mining. Section 6.2 discusses the relationship between security, privacy and data mining. Section 6.3 introduces the foundation for PPDM. Section 6.4 discusses the collusion behaviors in PPDM. Concluding remarks are given in the Section 6.5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abraham I, Dolev D, Gonen R, Halpern J (2006) Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: PODC 2006, pp 53–62, Denver, CO

    Google Scholar 

  • Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceeding of the 2000 ACM SIGMOD Conference on Management of Data, pp 439–450, Dallas, TX, 14–19 May 2000

    Google Scholar 

  • Agrawal R, Terzi E (2006) On honesty in sovereign information sharing. In: EDBT’06, pp 240–256, Munich, Germany, March 2006

    Google Scholar 

  • Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy preserving distributed data mining. SIGKDD Explor 4(2):28–34

    Article  Google Scholar 

  • Ge X, Zhu J (2009) Collusion-resistant protocol for privacy-preserving distributed association rules mining. In: Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China

    Google Scholar 

  • Guo S (2007) Analysis of and techniques for privacy preserving data mining. PhD thesis, University of North Carolina at Charlotte, 2007

    Google Scholar 

  • Jiang W, Clifton C (2006) Transforming semi-honest protocols to ensure accountability. In: PADM’06, pp 524–529, Hong Kong, China, 2006

    Google Scholar 

  • Kargupta H, Das K, Liu K (2007) Multi-party, privacy-preserving distributed data mining using a game theoretic framework. In: PKDD, vol 4702, Lecture Notes in Computer Science, pp 523–531. Springer, Berlin Heidelberg New York

    Google Scholar 

  • Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Advances in Cryptology. CRYPTO 2000, pp 36–54, 20–24 August 2000. Springer, Berlin Heidelberg New York

    Google Scholar 

  • Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptology 15(3):177–206

    Article  MathSciNet  MATH  Google Scholar 

  • Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Privacy Confident 1(1):59–98

    Google Scholar 

  • Liu K (2007) Multiplicative data perturbation for privacy preserving data mining. PhD thesis, University of Maryland Baltimore County, Baltimore, MD, 2007

    Google Scholar 

  • Liu L (2008) Perturbation based privacy preserving data mining techniques for real-world data. PhD thesis, University of Texas at Dallas, 2008

    Google Scholar 

  • Oliveira SM (2005) Data transformation for privacy-preserving data mining. PhD thesis, University of Alberta, Edmonton, Alberta, 2005

    Google Scholar 

  • Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Know Data Eng 13(6):1010–1027

    Article  Google Scholar 

  • Shaneck M (2007) Privacy preserving nearest neighbor search and its applications. PhD thesis, University of Minnesota, 2007

    Google Scholar 

  • Vaidya JS (2004) Privacy preserving data mining over vertically partitioned data. PhD thesis, Purdue University, 2004

    Google Scholar 

  • Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science

    Google Scholar 

  • Yao AC (1986) How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp 162–167, Toronto, Ontario, Canada, 27–29 Oct 1986

    Google Scholar 

  • Zhan J (2008) Privacy-preserving collaborative data mining. IEEE Comput Intell 3:31–41

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer

About this chapter

Cite this chapter

Yin, Y., Kaku, I., Tang, J., Zhu, J. (2011). Privacy-preserving Data Mining. In: Data Mining. Decision Engineering. Springer, London. https://doi.org/10.1007/978-1-84996-338-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-84996-338-1_6

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84996-337-4

  • Online ISBN: 978-1-84996-338-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics