Survey on privacy preserving data mining techniques in health care databases

被引:5
|
作者
Gal, Tamas Zoltan [1 ]
Kovacs, Gabor [1 ]
Kardkovacs, Zsolt T. [1 ]
机构
[1] U1 Res, 2 INFOPK Gabor Denes, Budapest, Hungary
关键词
anonymization; privacy preservation; health care database; survey; data mining; sensitive data;
D O I
10.2478/ausi-2014-0017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In health care databases, there are tireless and antagonistic interests between data mining research and privacy preservation, the more you try to hide sensitive private information, the less valuable it is for analysis. In this paper, we give an outlook on data anonymization problems by case studies. We give a summary on the state-of-the-art health care data anonymization issues including legal environment and expectations, the most common attacking strategies on privacy, and the proposed metrics for evaluating usefulness and privacy preservation for anonymization. Finally, we summarize the strength and the shortcomings of different approaches and techniques from the literature based on these evaluations.
引用
收藏
页码:33 / 55
页数:23
相关论文
共 50 条
  • [41] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [42] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [43] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [44] Privacy-preserving association rule mining: a survey of techniques for sensitive rule identification and enhanced data protection
    Barua E.
    Dutta M.
    [J]. International Journal of Computers and Applications, 2024, 46 (04) : 252 - 265
  • [45] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [46] Privacy Preserving Techniques For Storage Privacy Attacks:A Survey
    Pawar, Tejaswini
    Kamalapur, Snehal
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 283 - 287
  • [47] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [48] Study of Privacy Preserving Data Mining
    Li, Haisheng
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
  • [49] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [50] A Survey on Preserving Privacy for Sensitive Association Rules in Databases
    Modi, Chirag
    Rao, U. P.
    Patel, Dhiren R.
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 538 - +