Skip to main content

Research on Privacy Protection Methods for Data Mining

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1796))

Included in the following conference series:

  • 326 Accesses

Abstract

With the applications of big data and cloud computing technologies in industries, data mining technologies have been developing rapidly in these years. However, privacy issues have been attracting attentions for users and researchers since the laws and regulations of protecting personal information are issued. How to appropriately apply data mining technologies while meeting the privacy protection requirements become an important problem to address. In this paper, the privacy preserving data mining technologies are studied including K-means, Support Vector Machine, decision tree and association rule mining. In addition to their principles, the corresponding privacy protection methods for them are discussed. Furthermore, the commonly used privacy protection methods are studied including restricted release, searchable symmetric encryption, homomorphic encryption and digital envelope. Finally, the suggestions are given that the data processing algorithms need to be improved to obtain the better balance between data mining efficiency and privacy protection, and the system could be designed to provide privacy protection measures to meet personalized demands. The studies in this paper are expected to provide technical ideas to various service providers such as personal recommendation to implement privacy protection strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, X., Zhu, X., Wu, G.-Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97–107 (2014)

    Article  Google Scholar 

  2. Mahmud, M.S., Huang, J.Z., Salloum, S., Emara, T.Z., Sadatdiynov, K.: A survey of data partitioning and sampling methods to support big data analysis. Big Data Min. Analytics 3(2), 85–101 (2020)

    Article  Google Scholar 

  3. Gan, H.: Research on data mining method based on privacy protection. In: 2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), pp. 502–506 (2020)

    Google Scholar 

  4. Su, X., Fan, K., Shi, W.: Privacy-preserving distributed data fusion based on attribute protection. IEEE Trans. Industr. Inf. 15(10), 5765–5777 (2019)

    Article  Google Scholar 

  5. Zigomitros, A., Casino, F., Solanas, A., Patsakis, C.: A survey on privacy properties for data publishing of relational data. IEEE Access 8, 51071–51099 (2020)

    Article  Google Scholar 

  6. Binjubeir, M., Ahmed, A.A., Ismail, M.A.B., Sadiq, A.S., Khan, M.K.: Comprehensive survey on big data privacy protection. IEEE Access 8, 20067–20079 (2020)

    Article  Google Scholar 

  7. Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239–258 (2021)

    Article  Google Scholar 

  8. Wang, X., Luo, W., Bai, X., Wang, Y. Research on big data security and privacy risk governance. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), pp. 15–18 (2021)

    Google Scholar 

  9. Lv, C. The Dilemma and Countermeasures of Personal Privacy Protection in the Era of Big Data. 2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI), pp. 335–338 (2022)

    Google Scholar 

  10. Venkatachalam, K., Reddy, V.P., Amudhan, M., Raguraman, A., Mohan, E.: an implementation of k-means clustering for efficient image segmentation. In: 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 224–229 (2021)

    Google Scholar 

  11. Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Industr. Inf. 13(4), 2066–2076 (2017)

    Article  Google Scholar 

  12. Lu, Z., Shen, H.: Differentially private k-means clustering with convergence guarantee. IEEE Trans. Dependable Secure Comput. 18(4), 1541–1552 (2021)

    Google Scholar 

  13. Lv, Z., Wei, L., Chen, Y., Liu, Y., Li, C., Peng, D.: Differential privacy algorithm for integrated energy system based on improved k-means. In: 2021 6th International Conference on Power and Renewable Energy (ICPRE), pp. 1359–1363 (2021)

    Google Scholar 

  14. Mohan, L., Pant, J., Suyal, P., Kumar, A.: Support vector machine accuracy improvement with classification. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 477–481 (2020)

    Google Scholar 

  15. Sun, X., Zhang, Z., Huang, W. Privacy-preserving SVM classification algorithm based on negative database. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1402–1407 (2022)

    Google Scholar 

  16. Wang, J., Wu, L., Wang, H., Choo, K.-K.R., He, D.: An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet Things J. 8(1), 458–473 (2021)

    Article  Google Scholar 

  17. Chen, Y., Mao, Q., Wang, B., Duan, P., Zhang, B., Hong, Z.: Privacy-preserving multi-class support vector machine model on medical diagnosis. IEEE J. Biomed. Health Inform. 26(7), 3342–3353 (2022)

    Article  Google Scholar 

  18. Yang, F.-J.: An extended idea about decision trees. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 349–354 (2019)

    Google Scholar 

  19. Ding, S., Cao, Z., Dong, X.: Efficient privacy preserving decision tree inference service. In: 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), pp. 512–516 (2020)

    Google Scholar 

  20. Liang, J., Qin, Z., Xiao, S., Ou, L., Lin, X.: Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Dependable Secure Comput. 18(4), 1632–1644 (2021)

    Article  Google Scholar 

  21. Zhang, L., Wang, W., Zhang, Y.: Privacy preserving association rule mining: taxonomy, techniques, and metrics. IEEE Access 7, 45032–45047 (2019)

    Article  Google Scholar 

  22. Shi, Z., Fu, X., Li, X., Zhu, K.: ESVSSE: enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans. Knowl. Data Eng. 34(7), 3241–3254 (2022)

    Google Scholar 

  23. Wu, J., Mu, N., Lei, X., Le, J., Zhang, D., Liao, X.: SecEDMO: enabling efficient data mining with strong privacy protection in cloud computing. IEEE Trans. Cloud Comput. 10(1), 691–705 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jindong He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, J., Cai, R., Lei, S., Wu, D. (2023). Research on Privacy Protection Methods for Data Mining. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3300-6_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3299-3

  • Online ISBN: 978-981-99-3300-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics