Databases Reference
In-Depth Information
7 Summary
In this paper, we presented a survey of the broad areas of privacy-preserving
data mining and the underlying algorithms. We discussed a variety of data
modification techniques such as randomization and k -anonymity based tech-
niques. We discussed methods for distributed privacy-preserving mining, and
the methods for handling horizontally and vertically partitioned data. We
discussed the issue of downgrading the effectiveness of data mining and data
management applications such as association rule mining, classification, and
query processing. Finally, we discussed some fundamental limitations of the
problem of privacy-preservation in the presence of increased amounts of public
information and background knowledge.
References
1. Adam N., Wortmann J. C.: Security-Control Methods for Statistical Databases:
A Comparison Study. ACM Computing Surveys , 21(4), 1989.
2. Agrawal R., Srikant R. Privacy-Preserving Data Mining. Proceedings of the
ACM SIGMOD Conference , 2000.
3. Agrawal R., Srikant R., Thomas D. Privacy-Preserving OLAP. Proceedings of
the ACM SIGMOD Conference , 2005.
4. Agrawal R., Bayardo R., Faloutsos C., Kiernan J., Rantzau R., Srikant R.:
Auditing Compliance via a hippocratic database. VLDB Conference , 2004.
5. Agrawal D. Aggarwal C. C. On the Design and Quantification of Privacy-
Preserving Data Mining Algorithms. ACM PODS Conference , 2002.
6. Aggarwal C., Pei J., Zhang B. A Framework for Privacy Preservation against
Adversarial Data Mining. ACM KDD Conference , 2006.
7. Aggarwal C. C. On k -anonymity and the curse of dimensionality. VLDB Con-
ference , 2005.
8. Aggarwal C. C., Yu P. S.: A Condensation approach to privacy preserving data
mining. EDBT Conference , 2004.
9. Aggarwal C. C., Yu P. S.: On Variable Constraints in Privacy-Preserving Data
Mining. SIAM Conference , 2005.
10. Aggarwal C. C.: On Randomization, Public Information and the Curse of Di-
mensionality. ICDE Conference , 2007.
11. Aggarwal G., Feder T., Kenthapadi K., Motwani R., Panigrahy R., Thomas
D., Zhu A.: Anonymizing Tables. ICDT Conference , 2005.
12. Aggarwal G., Feder T., Kenthapadi K., Motwani R., Panigrahy R., Thomas
D., Zhu A.: Approximation Algorithms for k -anonymity. Journal of Privacy
Technology , paper 20051120001, 2005.
13. Aggarwal G., Feder T., Kenthapadi K., Khuller S., Motwani R., Panigrahy
R., Thomas D., Zhu A.: Achieving Anonymity via Clustering. ACM PODS
Conference , 2006.
14. Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios, V.: Disclosure
limitation of sensitive rules, Workshop on Knowledge and Data Engineering
Exchange , 1999.
Search WWH ::




Custom Search