skip to main content
article

State-of-the-art in privacy preserving data mining

Published:01 March 2004Publication History
Skip Abstract Section

Abstract

We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining. We also propose a classification hierarchy that sets the basis for analyzing the work which has been performed in this context. A detailed review of the work accomplished in this area is also given, along with the coordinates of each work to the classification hierarchy. A brief evaluation is performed, and some initial conclusions are made.

References

  1. Nabil Adam and John C. Wortmann, Security-Control Methods for Statistical Databases: A Comparison Study, ACM Computing Surveys 21 (1989), no. 4, 515--556.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Dakshi Agrawal and Charu C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, In Proceedings of the 20th ACMS ymposium on Principles of Database Systems (2001), 247--255.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Rakesh Agrawal and Ramakrishnan Srikant, Privacy-preserving data mining, In Proceedings of the ACM SIGMOD Conference on Management of Data (2000), 439--450.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mike J. Atallah, Elisa Bertino, Ahmed K. Elmagarmid, Mohamed Ibrahim, and Vassilios S. Verykios, Disclosure Limitation of Sensitive Rules In Proceedings of the IEEE Knolwedge and Data Engineering Workshop (1999), 45--52.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. LiWu Chang and Ira S. Moskowitz, Parsimonious downgrading and decision trees applied to the inference problem, In Proceedings of the 1998 New Security Paradigms Workshop (1998), 82--89.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. LiWu Chang and Ira S. Moskowitz, An integrated framework for database inference and privacy protection, Data and Applications Security (2000), 161--172, Kluwer, IFIP WG 11.3, The Netherlands.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. David W. Cheung, Jiawei Han, Vincent T. Ng, Ada W. Fu, and Yongjian Fu, A fast distributed algorithm for mining association rules, In Proceedings of the 1996 International Conference on Parallel and Distributed Information Systems (1996).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chris Clifton, Murat Kantarcioglou, Xiadong Lin, and Michael Y. Zhu, Tools for privacy preserving distributed data mining, SIGKDD Explorations 4 (2002), no. 2.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chris Clifton and Donald Marks, Security and privacy implications of data mining, In Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (1996), 15--19.]]Google ScholarGoogle Scholar
  10. Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, and Elisa Bertino, Hiding Association Rules by using Confidence and Support, In Proceedings of the 4th Information Hiding Workshop (2001), 369--383.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Wenliang Du and Mikhail J. Attalah, Secure multiproblem computation problems and their applications: A review and open problems Tech. Report CERIAS Tech Report 2001-51, Center for Education and Research in Information Assurance and Security and Department of Computer Sciences, Purdue University, West Lafayette, IN 47906, 2001.]]Google ScholarGoogle Scholar
  12. Wenliang Du and Zhijun Zhan, Building decision tree classifier on private data, In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh Agrawal, and Johannes Gehrke, Privacy preserving mining of association rules, In Proceedings of the 8th ACM SIGKDDD International Conference on Knowledge Discovery and Data Mining (2002).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ioannis Ioannidis, Ananth Grama, and Mikhail Atallah, A secure protocol for computing dot products in clustered and distributed environments, In Proceedings of the International Conference on Parallel Processing (2002).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Murat Kantarcioglou and Chris Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, In Proceedings of the ACM SIGMOD Workshop on Research Isuues in Data Mining and Knowledge Discovery (2002), 24--31.]]Google ScholarGoogle Scholar
  16. Yehuda Lindell and Benny Pinkas, Privacy preserving data mining, In Advances in Cryptology -CRYPTO 2000 (2000), 36--54.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ira S. Moskowitz and LiWu Chang, A decision theoretical based system for information downgrading, In Proceedings of the 5th Joint Conference on Information Sciences (2000).]]Google ScholarGoogle Scholar
  18. Daniel E. O'Leary, Knowledge Discovery as a Threat to Database Security, In Proceedings of the 1st International Conference on Knowledge Discovery and Databases (1991), 107--516.]]Google ScholarGoogle Scholar
  19. Stanley R. M. Oliveira and Osmar R. Zaiane, Privacy preserving frequent itemset mining, In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002), 43--54.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Shariq J. Rizvi and Jayant R. Haritsa, Maintaing data privacy in association rule mining. In Proceedings of the 28th International Conference on Very Large Databases (2002).]]Google ScholarGoogle Scholar
  21. Yucel Saygin, Vassilios Verykios, and Chris Clifton, Using unknowns to prevent discovery of association rules, SIGMOD Record 30 (2001)no. 4, 45--54.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yucel Saygin, Vassilios S. Verykios, and Ahmed K. Elmagarmid, Privacy preserving association rule mining, In Proceedings of the 12th International Workshop on Research Issues in Data Engineering (2002), 151--158.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jaideep Vaidya and Chris Clifton, Privacy preserving association rule mining in vertically partitioned data, In the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002), 639--644.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Vassilios S. Verykios, Ahmed K. Elmagarmid, Bertino Elisa, Yucel Saygin, and Dasseni Elena, Association Rule Hiding. IEEE Transactions on Knowledge and Data Engineering (2003), Accepted.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGMOD Record
    ACM SIGMOD Record  Volume 33, Issue 1
    March 2004
    135 pages
    ISSN:0163-5808
    DOI:10.1145/974121
    Issue’s Table of Contents

    Copyright © 2004 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 March 2004

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader