Recent Developments in Privacy-preserving Mining of Clinical Data

被引:2
|
作者
Desmet, Chance [1 ]
Cook, Diane J. [1 ]
机构
[1] Washington State University, P.O. Box 642752, Pullman,WA,99164- 2752, United States
来源
关键词
Clinical application - Clinical data - Clinical PPDM - Large amounts of data - Personal information - PPDM - Privacy - Privacy preserving - Privacy-preserving data mining - Recent researches;
D O I
10.1145/3447774
中图分类号
学科分类号
摘要
With the dramatic improvements in both the capability to collect personal data and the capability to analyze large amounts of data, increasingly sophisticated and personal insights are being drawn. These insights are valuable for clinical applications but also open up possibilities for identification and abuse of personal information. In this article, we survey recent research on classical methods of privacy-preserving data mining. Looking at dominant techniques and recent innovations to them, we examine the applicability of these methods to the privacy-preserving analysis of clinical data. We also discuss promising directions for future research in this area. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [41] Privacy-Preserving in the Context of Data Mining and Deep Learning
    Altalhi, Amjaad
    Al-Saedi, Maram
    Alsuwat, Hatim
    Alsuwat, Emad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06): : 137 - 142
  • [42] PrivPy: General and Scalable Privacy-Preserving Data Mining
    Li, Yi
    Xu, Wei
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 1299 - 1307
  • [43] Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering
    Ouda, Mohamed
    Salem, Sameh
    Ali, Ihab
    Saad, El-Sayed
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (06) : 604 - 612
  • [44] Efficient Privacy-Preserving Data Mining in Malicious Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
  • [45] Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining
    Merani, Maria Luisa
    Croce, Daniele
    Tinnirello, Ilenia
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (06) : 1340 - 1352
  • [46] Privacy-preserving data mining on data grids in the presence of malicious participants
    Gilburd, B
    Schuster, A
    Wolff, R
    [J]. 13TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 225 - 234
  • [47] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [48] A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User
    Cai, Li
    Su, JianYing
    [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 25 - +
  • [49] Distributed anonymous data perturbation method for privacy-preserving data mining
    Feng Li
    Jin Ma
    Jian-hua Li
    [J]. Journal of Zhejiang University-SCIENCE A, 2009, 10 : 952 - 963
  • [50] Distributed anonymous data perturbation method for privacy-preserving data mining
    Li, Feng
    Ma, Jin
    Li, Jian-hua
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (07): : 952 - 963