Secure multiparty computation for privacy preserving data mining

Y Lindell - Encyclopedia of Data Warehousing and Mining, 2005 - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …

When do data mining results violate privacy?

M Kantarcioǧlu, J Jin, C Clifton - Proceedings of the tenth ACM SIGKDD …, 2004 - dl.acm.org
Privacy-preserving data mining has concentrated on obtaining valid results when the input
data is private. An extreme example is Secure Multiparty Computation-based methods …

Privacy preserving data mining

Y Lindell, B Pinkas - Annual international cryptology conference, 2000 - Springer
In this paper we introduce the concept of privacy preserving data mining. In our model, two
parties owning confidential databases wish to run a data mining algorithm on the union of …

State-of-the-art in privacy preserving data mining

VS Verykios, E Bertino, IN Fovino, LP Provenza… - ACM Sigmod …, 2004 - dl.acm.org
We provide here an overview of the new and rapidly emerging research area of privacy
preserving data mining. We also propose a classification hierarchy that sets the basis for …

Privacy-preserving data mining systems

N Zhang, W Zhao - Computer, 2007 - ieeexplore.ieee.org
Although successful in many applications, data mining poses special concerns for private
data. An integrated architecture takes a systemic view of the problem, implementing …

Tools for privacy preserving distributed data mining

C Clifton, M Kantarcioglu, J Vaidya, X Lin… - ACM Sigkdd Explorations …, 2002 - dl.acm.org
Privacy preserving mining of distributed data has numerous applications. Each application
poses different constraints: What is meant by privacy, what are the desired results, how is the …

Privacy-preserving data mining: Why, how, and when

J Vaidya, C Clifton - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Data mining is under attack from privacy advocates because of a misunderstanding about
what it actually is and a valid concern about how it is generally done. This article shows how …

[PDF][PDF] Defining privacy for data mining

C Clifton, M Kantarcioglu, J Vaidya - National science foundation …, 2002 - Citeseer
Privacy preserving data mining–getting valid data mining results without learning the
underlying data values–has been receiving attention in the research community and …

Privacy preserving data mining

Lindell, Pinkas - Journal of cryptology, 2002 - Springer
In this paper we address the issue of privacy preserving data mining. Specifically, we
consider a scenario in which two parties owning confidential databases wish to run a data …

[图书][B] A general survey of privacy-preserving data mining models and algorithms

CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …