Skip to main content

Privacy-Preserving Data Mining

  • Living reference work entry
  • First Online:
Encyclopedia of Database Systems

Definition

Data Mining techniques that use specialized approaches to protect against the disclosure of private information may involve anonymizing private data, distorting sensitive values, encrypting data, or other means to ensure that sensitive data is protected.

Historical Background

The field of privacy-preserving data mining began in 2000 with two papers of that name [1, 4]. Both papers addressed construction of decision trees, approximating the ID3 algorithm while limiting disclosure of data. While the problems appeared similar on the surface, the fundamental difference in privacy constraints shows the complexity of this field. In [1], the assumption was that individuals were providing their own data to a common server, and added noise to sensitive values to protect privacy. The key to the technique was to discover the original distribution of the data, enabling successful construction of the decision tree. In [4], the data was presumed to be divided between two (or a small...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Recommended Reading

  1. Agrawal R, Srikant R. Privacy-preserving data mining. In: Proceeding ACM SIGMOD international conference on management of data. 2000. p. 439–50.

    Google Scholar 

  2. Atallah MJ, Elmongui HG, Deshpande V, Schwarz LB. Secure supply-chain protocols. In: Proceeding. IEEE international conference on E-commerce. 2003. p. 293–302.

    Google Scholar 

  3. Kaski S. Dimensionality reduction by random mapping. In: Proceeding international joint conference on neural networks. 1999. p. 413–8.

    Google Scholar 

  4. Lindell Y, Pinkas B. Privacy preserving data mining. In: Advances in cryptology – CRYPTO 2000. Heidelberg: Springer; 2000. p. 36–54.

    Google Scholar 

  5. Oliveira SRM, Zaïane OR. Privacy preserving clustering by data transformation. In: Proceeding 18th Brazilian symposium on databases. 2003.

    Google Scholar 

  6. Vaidya J, Clifton C. Privacy-preserving outlier detection. In: Proceeding 2004 IEEE International conference on data mining. 2004. p. 233–40.

    Google Scholar 

  7. Vaidya J, Clifton C, Zhu M. Privacy preserving data mining. Berlin: Springer; 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris Clifton .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media LLC

About this entry

Cite this entry

Clifton, C. (2016). Privacy-Preserving Data Mining. In: Liu, L., Özsu, M. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4899-7993-3_270-2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-7993-3_270-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Online ISBN: 978-1-4899-7993-3

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics