Encyclopedia of Machine Learning

2010 Edition
| Editors: Claude Sammut, Geoffrey I. Webb

Privacy-Related Aspects and Techniques

  • Stan Matwin
Reference work entry
DOI: https://doi.org/10.1007/978-0-387-30164-8_668



The privacy-preserving aspects and techniques of machine learning cover the family of methods and architectures developed to protect the privacy of people whose data are used by machine learning (ML) algorithms. This field, also known as privacy-preserving data mining (PPDM), addresses the issues of data privacy in ML and data mining. Most existing methods and approaches are intended to hide the original data from the learning algorithm, while there is emerging interest in methods ensuring that the learned model does not reveal private information. Another research direction contemplates methods in which several parties bring their data into the model-building process without mutually revealing their own data.

Motivation and Background

The key concept for any discussion of the privacy aspects of data mining is the definition of privacy. After Alan Westin, we understand privacy as the ability “of individualsto determine for...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. Agrawal, D., & Aggarwal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. Santa Barbara, CA: ACM.Google Scholar
  2. Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining, ACM SIGMOD record (pp. 439–450).Google Scholar
  3. Atzori, M., Bonchi, F., Giannotti, F., & Pedreschi, D. (2005). k-Anonymous patterns. Proceedings of the ninth European conference on principles and practice of knowledge discovery in databases (PKDD 05). Porto, Portugal.Google Scholar
  4. Barth, A., Datta, A., Mitchell, J. C., & Nissenbaum, H. (2006). Privacy and contextual integrity: Framework and applications. IEEE Symposium on Security and Privacy, 184–198.Google Scholar
  5. Clifton, C. W. (2005). What is privacy? Critical steps for privacy-preserving data mining, workshop on privacy and security aspects of data mining.Google Scholar
  6. Directive 95/46/EC of the European Parliament on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities. (1995).Google Scholar
  7. Domingo-Ferrer, J., Sebé, F., & Solanas, A. (2008). An anonymity model achievable via microaggregation VLDB workshop on secure data management. Springer, (pp. 209–218).Google Scholar
  8. Du, W., & Zhan, Z. (2003). Using randomized response techniques for privacy-preserving data mining. Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining (Vol. 510).Google Scholar
  9. Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002). Privacy preserving mining of association rules. Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 217–228).Google Scholar
  10. Felty, A., & Matwin, S. (2002). Privacy-oriented data mining by proof checking. Sixth European conference on principles of data mining and knowledge discovery (Vol. 2431) (pp. 138–149).Google Scholar
  11. Friedman, A., Schuster, A., & Wolff, R. (2006). k-Anonymous decision tree induction, PKDD 2006 (pp. 151–162).Google Scholar
  12. Health, U. D. o., & Services, H. (Eds.) (2003). Summary of HIPAA privacy rule. Google Scholar
  13. Gianotti, F., & Pedreschi, D. (2008). Mobility, Data Mining and Privacy: Geographic Knowledge Discovery, Springer.Google Scholar
  14. Iyengar, V. S. (2002). Transforming data to satisfy privacy constraints. Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 279–288).Google Scholar
  15. Jiang, W., & Atzori, M. (2006). Secure distributed k-Anonymous pattern mining, proceedings of the sixth international conference on data mining. IEEE Computer Society.Google Scholar
  16. Kantarcioglu, M. & Clifton, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16, 1026–1037.CrossRefGoogle Scholar
  17. Kargupta, H., Datta, S., & Wang, Q. (2003). On the privacy preserving properties of random data perturbation techniques. Third IEEE international conference on data mining. ICDM 2003 (pp. 99–106).Google Scholar
  18. Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). L -diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1, 3.CrossRefGoogle Scholar
  19. Malin, B. A. (2005). An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Journal of the American Medical Informatics Association, 12, 28.CrossRefGoogle Scholar
  20. Moor, J. (2004). Towards a theory of privacy in the information age. In T. Bynum, & S. Rodgerson (Eds.), Computer Ethics and Professional Responsibility. Blackwell.Google Scholar
  21. Ninghui, L., Tiancheng, L., & Venkatasubramanian, S. (2007). t-Closeness: Privacy beyond k-Anonymity and l-Diversity. IEEE 23rd international conference on data engineering. ICDE 2007 (pp. 106–115).Google Scholar
  22. Oliveira, S. R. M., Zaïane, O. R., & Saygin, Y. (2004). Secure association rule sharing. Proceedings of the eighth PAKDD and advances in knowledge discovery and data mining (pp. 74–850).Google Scholar
  23. Paillier, P. (1999). The 26th international conference on privacy and personal data protection, advances in cryptography – EUROCRYPT’99 (pp. 23–38).Google Scholar
  24. Rossi, G. (2004). Privacy as quality in modern economy, the 26th international conference on privacy and personal data protection.Google Scholar
  25. Subramaniam, H., Wright, R. N., & Yang, Z. (2004). Experimental analysis of privacy-preserving statistics computation. Proceedings of the VLDB worshop on secure data management (pp. 55–66).Google Scholar
  26. Sweeney, L. (2001). Computational disclosure control: a primer on data privacy protection. Cambridge, MA: Massachusetts Institute of Technology, Deptartment of Electrical Engineering and Computer Science.Google Scholar
  27. Vaidya, J., & Clifton, C. (2002). Privacy preserving association rule mining in vertically partitioned data. Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 639–644) Edmonton, Alberta: ACM.Google Scholar
  28. Vaidya, J., Clifton, C., Kantarcioglu, M., & Patterson, A. S. (2008). Privacy-preserving decision trees over vertically partitioned data. ACM Transactions on Knowledge Discovery from Data, 2, 1–27.CrossRefGoogle Scholar
  29. Vaidya, J., Zhu, Y. M., & Clifton, C. W. (2006). Privacy preserving data mining. New York: Springer.MATHGoogle Scholar
  30. Website of the GeoPKDD Project.(2006).Google Scholar
  31. Westin, A. (1967). Privacy and freedom. New York: Atheneum.Google Scholar
  32. Yao, A. (1986). How to generate and exchange secrets. 27th FOCS.Google Scholar
  33. Zhan, J., Matwin, S., & Chang, L. (2007). Privacy-preserving collaborative association rule mining. Journal of Network and Computer Appliactions,30, 1216–1227.CrossRefGoogle Scholar
  34. Zhan, J. Z. & Matwin, S. (2004). Privacy-prteserving data mining in electronic surveys, ICEB 2004 (pp. 1179–1185).Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Stan Matwin
    • 1
  1. 1.University of OttawaOttawaCanada