Skip to main content

Privacy-Preserving Data Mining

  • Reference work entry
  • First Online:

Definition

Data Mining techniques that use specialized approaches to protect against the disclosure of private information may involve anonymizing private data, distorting sensitive values, encrypting data, or other means to ensure that sensitive data is protected.

Historical Background

The field of privacy-preserving data mining began in 2000 with two papers of that name [1,4]. Both papers addressed construction of decision trees, approximating the ID3 algorithm while limiting disclosure of data. While the problems appeared similar on the surface, the fundamental difference in privacy constraints shows the complexity of this field. In [1], the assumption was that individuals were providing their own data to a common server, and added noise to sensitive values to protect privacy. The key to the technique was to discover the original distribution of the data, enabling successful construction of the decision tree. In [4], the data was presumed to be divided between two (or a small...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Agrawal R, Srikant R. Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2000. p. 439–50.

    Google Scholar 

  2. Atallah MJ, Elmongui HG, Deshpande V, Schwarz LB. Secure supply-chain protocols. In: Proceedings of the IEEE International Conference on E-commerce; 2003. p. 293–302.

    Google Scholar 

  3. Kaski S. Dimensionality reduction by random mapping. In: Proceedings of the International Joint Conference on Neural Networks; 1999. p. 413–8.

    Google Scholar 

  4. Lindell Y, Pinkas B. Privacy preserving data mining. In: Advances in cryptology -- CRYPTO 2000. Heidelberg: Springer; 2000. p. 36–54.

    Chapter  Google Scholar 

  5. Oliveira SRM, Zaïane OR. Privacy preserving clustering by data transformation. In: Proceedings of the 18th Brazilian Symposium on Databases; 2003.

    Google Scholar 

  6. Vaidya J, Clifton C. Privacy-preserving outlier detection. In: Proceedings of the 4th IEEE International Conference on Data Mining; 2004. p. 233–40.

    Google Scholar 

  7. Vaidya J, Clifton C, Zhu M. Privacy preserving data mining. Berlin: Springer; 2006.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris Clifton .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Clifton, C. (2018). Privacy-Preserving Data Mining. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_270

Download citation

Publish with us

Policies and ethics