Database Reference
In-Depth Information
11.6 Conclusion
In this chapter, we review the existing Privacy-preserving Data Mining methods.
General knowledge and understanding of these methods and techniques is highly
relevant for preventing discriminatory effects of modern data mining techniques.
When appropriate, we have underscored the usability of specific techniques to
prevent discriminatory use of data mining. Some of the techniques presented in
this chapter generalize the data, so that any stigmatized group would not be more
targeted in the generalized data than it is in the general population. All data gene-
ralizations, however, incur a cost in data quality. The cryptographic approaches,
on the other hand, preserve the data but impose a heavy computational overhead.
The chapter is complete with a discussion of some of the challenges before PPDM
as a field.
Acknowledgments. Research support by the Natural Sciences and Engineering Research
Council of Canada and the Ontario Centres of Excellence is kindly acknowledged by the
author.
References
Aggarwal, C.C., Yu, P.S.: A framework for condensation-based anonymization of string
data. Data Mining and Knowledge Discovery 16, 251-275 (2008)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Record 29, 439-
450 (2000)
Atzori, M., Bonchi, F., et al.: Anonymity preserving pattern discovery. VLDB Jour-
nal 17(4), 703-727 (2008)
Bonizzoni, P., Della Vedova, G., Dondi, R.: The k -Anonymity Problem is Hard. In:
Kutyłowski, M., Charatonik, W., Gębala, M. (eds.) FCT 2009. LNCS, vol. 5699, pp.
26-37. Springer, Heidelberg (2009)
Chen, B.-C., Kifer, D., et al.: Privacy-Preserving Data Publishing. Found Trends Databas-
es 2(1-2), 1-167 (2009)
Chen, B.-C., LeFevre, K., et al.: Privacy skyline: privacy with multidimensional adversarial
knowledge. In: Proceedings of the 33rd International Conference on Very Large Data
Bases, Vienna, Austria. VLDB Endowment (2007)
Ciriani, V., Capitani di Vimercati, S., et al.: k-Anonymity. Secure Data Management in De-
centralized Systems 33, 323-353 (2007)
El Emam, K., Dankar, F.K., et al.: A Globally Optimal k-Anonymity Method for the De-
Identification of Health Data. Journal of the American Medical Informatics Associa-
tion 16(5), 670-682 (2009)
Fang, L., Kim, H., et al.: A privacy recommendation wizard for users of social networking
sites. In: Proceedings of the 17th ACM Conference on Computer and Communications
Security, Chicago, Illinois, USA. ACM (2010)
Fung, B.C.M., Wang, K., et al.: Privacy-preserving data publishing: A survey of recent de-
velopments. ACM Comput. Surv. 42(4), 1-53 (2010)
Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97-
105 (2010)
Search WWH ::




Custom Search