Skip to main content

Recent Research on Privacy Preserving Data Mining

  • Conference paper
Information Systems Security (ICISS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4332))

Included in the following conference series:

  • 960 Accesses

Abstract

We review our recent work on privacy preserving data mining and present a new algorithm for association rules mining in vertically partitioned databases that doesnt use perturbation or secure computation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD 2000, Dallas, Texas, USA, May 2000, pp. 439–450 (2000)

    Google Scholar 

  2. Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proc. of PODS 2003, June 2003, pp. 202–210 (2003)

    Google Scholar 

  3. Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: A review and open problems. In: Proceedings of the 2001 New Security Paradigms Workshop, Cloudcroft, New Mexico, September 11-13 (2001)

    Google Scholar 

  4. Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proc. of ACM SIGKDD 2002, Canada, July 2002, pp. 217–228 (2002)

    Google Scholar 

  5. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing (1987)

    Google Scholar 

  6. Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. of ACM SIGMOD 2005 (2005)

    Google Scholar 

  7. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proc. of ICDM 2003, Washington, DC, USA, p. 99 (2003)

    Google Scholar 

  8. Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security 13(4), 593–622 (2005)

    Google Scholar 

  9. Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: A review and open problems. In: Proceedings of the 2001 New Security Paradigms Workshop, Cloudcroft, New Mexico, September 11-13 (2001)

    Google Scholar 

  10. Vaidya, J., Clifton, C., Kantarcioglu, M.: Defining privacy for data mining. In: Kargupta, H., Joshi, A., Sivakumar, K. (eds.) National Science Foundation Workshop on Next Generation Data Mining, Baltimore, MD, November 1-3 (2002)

    Google Scholar 

  11. Rozenberg, B., Gudes, E.: Privacy Preserving Data Mining in Vertically Partitioned Databases. In: 7th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado (2003)

    Google Scholar 

  12. Rozenberg, B., Gudes, E.: Analysis of Two Approaches for Association Rules Mining in Vertically Partitioned Databases. In: Proceedings of ICDM workshop on security and privacy, Brighton, UK (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gurevich, A., Gudes, E. (2006). Recent Research on Privacy Preserving Data Mining. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_32

Download citation

  • DOI: https://doi.org/10.1007/11961635_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68962-1

  • Online ISBN: 978-3-540-68963-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics