A Close Look at Privacy Preserving Data Mining Methods

被引:0
|
作者
Wu, Xiaodan [1 ]
Wang, Yunfeng [1 ]
Chu, Chao-Hsien [2 ]
Liu, Fengli [1 ]
Chen, Ping [1 ]
Yue, Dianmin [1 ]
机构
[1] Hebei Univ Technol, Tianjin 300130, Peoples R China
[2] Singapore Management Univ, Singapore 178902, Singapore
关键词
Privacy preservation; data mining; knowledge discovery; data perturbation; secure multiparty computation;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Recent advances in information, communications, data mining, and security technologies have gave rise to a new era of research, known as privacy preserving data mining (PPDM). Several data mining algorithms, incorporating privacy preserving mechanisms, have been developed that allow one to extract relevant knowledge from large amount of data, while hide sensitive data or information from disclosure or inference. PPDM is a new attempt; thus, several research questions have often being asked. For instance: (1) how to measure the performance of these algorithms? (2) how effective of these algorithms in terms of privacy preserving? (3) will they impact the accuracy of data mining results? And (4) which one can better protect sensitive information? To help answer these questions, we conduct an extensive review on literature. We present a classification scheme, adopted from early studies, to guide the review process. Finally, we share directions for future research.
引用
收藏
页码:167 / +
页数:4
相关论文
共 50 条
  • [1] Tools for privacy preserving kernel methods in data mining
    Wan, HP
    He, HC
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, 2006, : 388 - +
  • [2] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [3] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [4] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [5] Privacy-Preserving Data Mining: Methods, Metrics, and Applications
    Mendes, Ricardo
    Vilela, Joao P.
    [J]. IEEE ACCESS, 2017, 5 : 10562 - 10582
  • [6] Two methods for privacy preserving data mining with malicious participants
    Shah, Divyesh
    Zhong, Sheng
    [J]. INFORMATION SCIENCES, 2007, 177 (23) : 5468 - 5483
  • [7] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [8] Improving Privacy Preserving Methods to Enhance Data Mining for Correlation Research
    Brown, Emily E.
    [J]. SOUTHEASTCON 2017, 2017,
  • [9] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [10] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450