A Review on Privacy-Preserving Data Mining

被引:15
|
作者
Li, Xueyun [1 ]
Yan, Zheng [2 ,3 ]
Zhang, Peng [4 ]
机构
[1] Aalto Univ, Sch Elect Engn, Dept Commun & Networking, Espoo, Finland
[2] Xidian Univ, State Key Lab ISN, Xian, Shaanxi, Peoples R China
[3] Aalto Univ, Dept Commun & Networking, Espoo, Finland
[4] Xian Univ Posts & Telecommun, Inst Mobile Internet, Xian, Shaanxi, Peoples R China
关键词
Privacy preserving; data mining; data perturbation; k-anonymity; DATA PERTURBATION; TRUST;
D O I
10.1109/CIT.2014.135
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining has been widely studied and applied into many fields such as Internet of Things (IoT) and business development. However, data mining techniques also occur serious challenges due to increased sensitive information disclosure and privacy violation. Privacy-Preserving Data Mining (PPDM), as an important branch of data mining and an interesting topic in privacy preservation, has gained special attention in recent years. In addition to extracting useful information and revealing patterns from large amounts of data, PPDM also protects private and sensitive data from disclosure without the permission of data owners or providers. This paper reviews main PPDM techniques based on a PPDM framework. We compare the advantages and disadvantages of different PPDM techniques and discuss open issues and future research trends in PPDM.
引用
收藏
页码:769 / 774
页数:6
相关论文
共 50 条
  • [21] Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
    U. H. W. A. Hewage
    R. Sinha
    M. Asif Naeem
    [J]. Artificial Intelligence Review, 2023, 56 : 10427 - 10464
  • [22] Recent Developments in Privacy-preserving Mining of Clinical Data
    Desmet, Chance
    Cook, Diane J.
    [J]. ACM/IMS Transactions on Data Science, 2021, 2 (04):
  • [23] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [24] Efficient paillier cryptoprocessor for privacy-preserving data mining
    San, Ismail
    At, Nuray
    Yakut, Ibrahim
    Polat, Huseyin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1535 - 1546
  • [25] A New Scheme to Privacy-Preserving Collaborative Data Mining
    Zhu, Jianming
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 468 - 471
  • [26] Privacy-Preserving Data Mining: Methods, Metrics, and Applications
    Mendes, Ricardo
    Vilela, Joao P.
    [J]. IEEE ACCESS, 2017, 5 : 10562 - 10582
  • [27] Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
    Nix, Robert
    Kantarcioglu, Murat
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 129 - 144
  • [28] Data privacy in construction industry by privacy-preserving data mining (PPDM) approach
    Patel T.
    Patel V.
    [J]. Asian Journal of Civil Engineering, 2020, 21 (3) : 505 - 515
  • [29] DAG: A General Model for Privacy-Preserving Data Mining
    Teo, Sin G.
    Cao, Jianneng
    Lee, Vincent C. S.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (01) : 40 - 53
  • [30] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90