Privacy-Preserving Data Mining: Methods, Metrics, and Applications

被引:162
作者
Mendes, Ricardo [1 ]
Vilela, Joao P. [1 ]
机构
[1] Univ Coimbra, Dept Informat Engn, CISUC, P-3004504 Coimbra, Portugal
关键词
Survey; privacy; data mining; privacy-preserving data mining; metrics; knowledge extraction; OF-THE-ART; DIFFERENTIAL PRIVACY; ASSOCIATION RULES; LOCATION PRIVACY; DATA AGGREGATION; HEALTH RECORDS; PROTECTION; PROTOCOL; MODEL; PRESERVATION;
D O I
10.1109/ACCESS.2017.2706947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The collection and analysis of data are continuously growing due to the pervasiveness of computing devices. The analysis of such information is fostering businesses and contributing beneficially to the society in many different fields. However, this storage and flow of possibly sensitive data poses serious privacy concerns. Methods that allow the knowledge extraction from data, while preserving privacy, are known as privacy-preserving data mining ( PPDM) techniques. This paper surveys the most relevant PPDM techniques from the literature and the metrics used to evaluate such techniques and presents typical applications of PPDM methods in relevant fields. Furthermore, the current challenges and open issues in PPDM are discussed.
引用
收藏
页码:10562 / 10582
页数:21
相关论文
共 140 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]   Protecting online social networks profiles by hiding sensitive data attributes [J].
AbdulKader, Hatem ;
ElAbd, Emad ;
Ead, Waleed .
4TH SYMPOSIUM ON DATA MINING APPLICATIONS (SDMA2016), 2016, 82 :20-27
[3]   Privacy and human behavior in the age of information [J].
Acquisti, Alessandro ;
Brandimarte, Laura ;
Loewenstein, George .
SCIENCE, 2015, 347 (6221) :509-514
[4]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[5]  
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P11
[6]   User-side adaptive protection of location privacy in participatory sensing [J].
Agir, Berker ;
Papaioannou, Thanasis G. ;
Narendula, Rammohan ;
Aberer, Karl ;
Hubaux, Jean-Pierre .
GEOINFORMATICA, 2014, 18 (01) :165-191
[7]  
Agrawal D., 2001, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '01), P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[8]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[9]   Securing electronic health records without impeding the flow of information [J].
Agrawal, Rakesh ;
Johnson, Christopher .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) :471-479
[10]  
Akyildiz I. F., 2004, Ad Hoc Networks, V2, P351, DOI DOI 10.1016/J.ADH0C.2004.04.003