Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/62136
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBrankovic, Ljiljanaen
dc.contributor.authorIslam, Zahidulen
dc.contributor.authorGiggins, Helenen
local.source.editorEditor(s): Milan Petkovic and Willem Jonkeren
dc.date.accessioned2024-08-12T23:10:12Z-
dc.date.available2024-08-12T23:10:12Z-
dc.date.issued2007-
dc.identifier.citationSecurity, Privacy, and Trust in Modern Data Management, p. 151-165en
dc.identifier.isbn9783540698609en
dc.identifier.isbn9783540698616en
dc.identifier.urihttps://hdl.handle.net/1959.11/62136-
dc.description.abstractDespite enormous benefits and the extremely fast proliferation of data mining in recent years, data owners and researchers alike have acknowledged that data mining also revives old and introduces new threats to individual privacy. Many believe that data mining is, and will continue to be, one of the most significant privacy challenges in years to come. We live in an information age where vast amounts of personal data are regularly collected in the process of bank transactions, credit-card payments, making phone calls, using reward cards, visiting doctors and renting videos and cars, to mention but a few examples. All these data are typically used for data mining and statistical analysis and are often sold to other companies and organizations. A breach of privacy occurs when individuals are not aware that the data have been collected in the first place, have been passed onto other companies and organizations, or have been used for purposes other than the one for which they were originally collected. Even when individuals approve of use of their personal records for data mining and statistical analysis, for example in medical research, it is still assumed that only aggregate values will be made available to researchers and that no individual values will be disclosed. Various techniques can be employed in order to ensure the confidentiality of individual records and other sensitive information. They include adding noise to the original data, so that disclosing perturbed data does not necessarily reveal the confidential individual values. Some techniques were developed specifically for mining vertically and/or horizontally partitioned data. In this scenario each partition belongs to a different party (e.g., a hospital), and no party is willing to share their data but they all have interest in mining the total data set comprising all of the partitions. There are other techniques that focus on protecting confidentiality of logic rules and patterns discovered from data. In this chapter we introduce the main issues in privacy-preserving data mining, provide a classification of existing techniques and survey the most important results in this area.en
dc.languageenen
dc.publisherSpringeren
dc.relation.ispartofSecurity, Privacy, and Trust in Modern Data Managementen
dc.relation.ispartofseriesData-Centric Systems and Applications.en
dc.titlePrivacy-Preserving Data Miningen
dc.typeBook Chapteren
dc.identifier.doi10.1007/978-3-540-69861-6_11en
local.contributor.firstnameLjiljanaen
local.contributor.firstnameZahidulen
local.contributor.firstnameHelenen
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryB1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeGermanyen
local.format.startpage151en
local.format.endpage165en
local.peerreviewedYesen
local.contributor.lastnameBrankovicen
local.contributor.lastnameIslamen
local.contributor.lastnameGigginsen
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/62136en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitlePrivacy-Preserving Data Miningen
local.output.categorydescriptionB1 Chapter in a Scholarly Booken
local.search.authorBrankovic, Ljiljanaen
local.search.authorIslam, Zahidulen
local.search.authorGiggins, Helenen
local.uneassociationNoen
local.atsiresearchNoen
local.isrevisionNoen
local.sensitive.culturalNoen
local.year.published2007en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/566eed3f-4709-4202-a2fe-00c259a4f6caen
local.subject.for2020460402 Data and information privacyen
local.subject.seo2020220499 Information systems, technologies and services not elsewhere classifieden
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Book Chapter
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

Page view(s)

144
checked on Sep 8, 2024
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.