Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review

被引:0
|
作者
U. H. W. A. Hewage
R. Sinha
M. Asif Naeem
机构
[1] Auckland University of Technology,School of Engineering Computer and Mathematical Sciences
[2] National University of Computer and Emerging Sciences,Department of Computer Science
来源
关键词
Privacy-preserving data mining; Data streams; Accuracy-privacy trade-off; Data privacy;
D O I
暂无
中图分类号
学科分类号
摘要
This study investigates existing input privacy-preserving data mining (PPDM) methods and privacy-preserving data stream mining methods (PPDSM), including their strengths and weaknesses. A further analysis was carried out to determine to what extent existing PPDM/PPDSM methods address the trade-off between data mining accuracy and data privacy which is a significant concern in the area. The systematic literature review was conducted using data extracted from 104 primary studies from 5 reputed databases. The scope of the study was defined using three research questions and adequate inclusion and exclusion criteria. According to the results of our study, we divided existing PPDM methods into four categories: perturbation, non-perturbation, secure multi-party computation, and combinations of PPDM methods. These methods have different strengths and weaknesses concerning the accuracy, privacy, time consumption, and more. Data stream mining must face additional challenges such as high volume, high speed, and computational complexity. The techniques proposed for PPDSM are less in number than the PPDM. We categorized PPDSM techniques into three categories (perturbation, non-perturbation, and other). Most PPDM methods can be applied to classification, followed by clustering and association rule mining. It was observed that numerous studies have identified and discussed the accuracy-privacy trade-off. However, there is a lack of studies providing solutions to the issue, especially in PPDSM.
引用
收藏
页码:10427 / 10464
页数:37
相关论文
共 50 条
  • [1] Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
    Hewage, U. H. W. A.
    Sinha, R.
    Naeem, M. Asif
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (09) : 10427 - 10464
  • [2] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [3] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [4] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [5] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [6] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    [J]. Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [7] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    [J]. FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +
  • [8] PRIVACY-PRESERVING COLLABORATIVE DATA MINING
    Zhan, Justin
    [J]. KMIS 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2009, : IS15 - IS15
  • [9] PRIVACY-PRESERVING COLLABORATIVE DATA MINING
    Zhan, Justin
    [J]. KDIR 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND INFORMATION RETRIEVAL, 2009, : IS15 - IS15
  • [10] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588