Skip to main content

2023 | OriginalPaper | Buchkapitel

Research on Privacy Protection Methods for Data Mining

verfasst von : Jindong He, Rongyan Cai, Shanshan Lei, Dan Wu

Erschienen in: Big Data and Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the applications of big data and cloud computing technologies in industries, data mining technologies have been developing rapidly in these years. However, privacy issues have been attracting attentions for users and researchers since the laws and regulations of protecting personal information are issued. How to appropriately apply data mining technologies while meeting the privacy protection requirements become an important problem to address. In this paper, the privacy preserving data mining technologies are studied including K-means, Support Vector Machine, decision tree and association rule mining. In addition to their principles, the corresponding privacy protection methods for them are discussed. Furthermore, the commonly used privacy protection methods are studied including restricted release, searchable symmetric encryption, homomorphic encryption and digital envelope. Finally, the suggestions are given that the data processing algorithms need to be improved to obtain the better balance between data mining efficiency and privacy protection, and the system could be designed to provide privacy protection measures to meet personalized demands. The studies in this paper are expected to provide technical ideas to various service providers such as personal recommendation to implement privacy protection strategies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, X., Zhu, X., Wu, G.-Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97–107 (2014)CrossRef Wu, X., Zhu, X., Wu, G.-Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97–107 (2014)CrossRef
2.
Zurück zum Zitat Mahmud, M.S., Huang, J.Z., Salloum, S., Emara, T.Z., Sadatdiynov, K.: A survey of data partitioning and sampling methods to support big data analysis. Big Data Min. Analytics 3(2), 85–101 (2020)CrossRef Mahmud, M.S., Huang, J.Z., Salloum, S., Emara, T.Z., Sadatdiynov, K.: A survey of data partitioning and sampling methods to support big data analysis. Big Data Min. Analytics 3(2), 85–101 (2020)CrossRef
3.
Zurück zum Zitat Gan, H.: Research on data mining method based on privacy protection. In: 2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), pp. 502–506 (2020) Gan, H.: Research on data mining method based on privacy protection. In: 2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), pp. 502–506 (2020)
4.
Zurück zum Zitat Su, X., Fan, K., Shi, W.: Privacy-preserving distributed data fusion based on attribute protection. IEEE Trans. Industr. Inf. 15(10), 5765–5777 (2019)CrossRef Su, X., Fan, K., Shi, W.: Privacy-preserving distributed data fusion based on attribute protection. IEEE Trans. Industr. Inf. 15(10), 5765–5777 (2019)CrossRef
5.
Zurück zum Zitat Zigomitros, A., Casino, F., Solanas, A., Patsakis, C.: A survey on privacy properties for data publishing of relational data. IEEE Access 8, 51071–51099 (2020)CrossRef Zigomitros, A., Casino, F., Solanas, A., Patsakis, C.: A survey on privacy properties for data publishing of relational data. IEEE Access 8, 51071–51099 (2020)CrossRef
6.
Zurück zum Zitat Binjubeir, M., Ahmed, A.A., Ismail, M.A.B., Sadiq, A.S., Khan, M.K.: Comprehensive survey on big data privacy protection. IEEE Access 8, 20067–20079 (2020)CrossRef Binjubeir, M., Ahmed, A.A., Ismail, M.A.B., Sadiq, A.S., Khan, M.K.: Comprehensive survey on big data privacy protection. IEEE Access 8, 20067–20079 (2020)CrossRef
7.
Zurück zum Zitat Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239–258 (2021)CrossRef Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239–258 (2021)CrossRef
8.
Zurück zum Zitat Wang, X., Luo, W., Bai, X., Wang, Y. Research on big data security and privacy risk governance. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), pp. 15–18 (2021) Wang, X., Luo, W., Bai, X., Wang, Y. Research on big data security and privacy risk governance. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), pp. 15–18 (2021)
9.
Zurück zum Zitat Lv, C. The Dilemma and Countermeasures of Personal Privacy Protection in the Era of Big Data. 2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI), pp. 335–338 (2022) Lv, C. The Dilemma and Countermeasures of Personal Privacy Protection in the Era of Big Data. 2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI), pp. 335–338 (2022)
10.
Zurück zum Zitat Venkatachalam, K., Reddy, V.P., Amudhan, M., Raguraman, A., Mohan, E.: an implementation of k-means clustering for efficient image segmentation. In: 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 224–229 (2021) Venkatachalam, K., Reddy, V.P., Amudhan, M., Raguraman, A., Mohan, E.: an implementation of k-means clustering for efficient image segmentation. In: 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 224–229 (2021)
11.
Zurück zum Zitat Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Industr. Inf. 13(4), 2066–2076 (2017)CrossRef Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Industr. Inf. 13(4), 2066–2076 (2017)CrossRef
12.
Zurück zum Zitat Lu, Z., Shen, H.: Differentially private k-means clustering with convergence guarantee. IEEE Trans. Dependable Secure Comput. 18(4), 1541–1552 (2021) Lu, Z., Shen, H.: Differentially private k-means clustering with convergence guarantee. IEEE Trans. Dependable Secure Comput. 18(4), 1541–1552 (2021)
13.
Zurück zum Zitat Lv, Z., Wei, L., Chen, Y., Liu, Y., Li, C., Peng, D.: Differential privacy algorithm for integrated energy system based on improved k-means. In: 2021 6th International Conference on Power and Renewable Energy (ICPRE), pp. 1359–1363 (2021) Lv, Z., Wei, L., Chen, Y., Liu, Y., Li, C., Peng, D.: Differential privacy algorithm for integrated energy system based on improved k-means. In: 2021 6th International Conference on Power and Renewable Energy (ICPRE), pp. 1359–1363 (2021)
14.
Zurück zum Zitat Mohan, L., Pant, J., Suyal, P., Kumar, A.: Support vector machine accuracy improvement with classification. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 477–481 (2020) Mohan, L., Pant, J., Suyal, P., Kumar, A.: Support vector machine accuracy improvement with classification. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 477–481 (2020)
15.
Zurück zum Zitat Sun, X., Zhang, Z., Huang, W. Privacy-preserving SVM classification algorithm based on negative database. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1402–1407 (2022) Sun, X., Zhang, Z., Huang, W. Privacy-preserving SVM classification algorithm based on negative database. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1402–1407 (2022)
16.
Zurück zum Zitat Wang, J., Wu, L., Wang, H., Choo, K.-K.R., He, D.: An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet Things J. 8(1), 458–473 (2021)CrossRef Wang, J., Wu, L., Wang, H., Choo, K.-K.R., He, D.: An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet Things J. 8(1), 458–473 (2021)CrossRef
17.
Zurück zum Zitat Chen, Y., Mao, Q., Wang, B., Duan, P., Zhang, B., Hong, Z.: Privacy-preserving multi-class support vector machine model on medical diagnosis. IEEE J. Biomed. Health Inform. 26(7), 3342–3353 (2022)CrossRef Chen, Y., Mao, Q., Wang, B., Duan, P., Zhang, B., Hong, Z.: Privacy-preserving multi-class support vector machine model on medical diagnosis. IEEE J. Biomed. Health Inform. 26(7), 3342–3353 (2022)CrossRef
18.
Zurück zum Zitat Yang, F.-J.: An extended idea about decision trees. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 349–354 (2019) Yang, F.-J.: An extended idea about decision trees. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 349–354 (2019)
19.
Zurück zum Zitat Ding, S., Cao, Z., Dong, X.: Efficient privacy preserving decision tree inference service. In: 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), pp. 512–516 (2020) Ding, S., Cao, Z., Dong, X.: Efficient privacy preserving decision tree inference service. In: 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), pp. 512–516 (2020)
20.
Zurück zum Zitat Liang, J., Qin, Z., Xiao, S., Ou, L., Lin, X.: Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Dependable Secure Comput. 18(4), 1632–1644 (2021)CrossRef Liang, J., Qin, Z., Xiao, S., Ou, L., Lin, X.: Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Dependable Secure Comput. 18(4), 1632–1644 (2021)CrossRef
21.
Zurück zum Zitat Zhang, L., Wang, W., Zhang, Y.: Privacy preserving association rule mining: taxonomy, techniques, and metrics. IEEE Access 7, 45032–45047 (2019)CrossRef Zhang, L., Wang, W., Zhang, Y.: Privacy preserving association rule mining: taxonomy, techniques, and metrics. IEEE Access 7, 45032–45047 (2019)CrossRef
22.
Zurück zum Zitat Shi, Z., Fu, X., Li, X., Zhu, K.: ESVSSE: enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans. Knowl. Data Eng. 34(7), 3241–3254 (2022) Shi, Z., Fu, X., Li, X., Zhu, K.: ESVSSE: enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans. Knowl. Data Eng. 34(7), 3241–3254 (2022)
23.
Zurück zum Zitat Wu, J., Mu, N., Lei, X., Le, J., Zhang, D., Liao, X.: SecEDMO: enabling efficient data mining with strong privacy protection in cloud computing. IEEE Trans. Cloud Comput. 10(1), 691–705 (2022)CrossRef Wu, J., Mu, N., Lei, X., Le, J., Zhang, D., Liao, X.: SecEDMO: enabling efficient data mining with strong privacy protection in cloud computing. IEEE Trans. Cloud Comput. 10(1), 691–705 (2022)CrossRef
Metadaten
Titel
Research on Privacy Protection Methods for Data Mining
verfasst von
Jindong He
Rongyan Cai
Shanshan Lei
Dan Wu
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-3300-6_44

Premium Partner