Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/62136
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brankovic, Ljiljana | en |
dc.contributor.author | Islam, Zahidul | en |
dc.contributor.author | Giggins, Helen | en |
local.source.editor | Editor(s): Milan Petkovic and Willem Jonker | en |
dc.date.accessioned | 2024-08-12T23:10:12Z | - |
dc.date.available | 2024-08-12T23:10:12Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Security, Privacy, and Trust in Modern Data Management, p. 151-165 | en |
dc.identifier.isbn | 9783540698609 | en |
dc.identifier.isbn | 9783540698616 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/62136 | - |
dc.description.abstract | Despite enormous benefits and the extremely fast proliferation of data mining in recent years, data owners and researchers alike have acknowledged that data mining also revives old and introduces new threats to individual privacy. Many believe that data mining is, and will continue to be, one of the most significant privacy challenges in years to come. We live in an information age where vast amounts of personal data are regularly collected in the process of bank transactions, credit-card payments, making phone calls, using reward cards, visiting doctors and renting videos and cars, to mention but a few examples. All these data are typically used for data mining and statistical analysis and are often sold to other companies and organizations. A breach of privacy occurs when individuals are not aware that the data have been collected in the first place, have been passed onto other companies and organizations, or have been used for purposes other than the one for which they were originally collected. Even when individuals approve of use of their personal records for data mining and statistical analysis, for example in medical research, it is still assumed that only aggregate values will be made available to researchers and that no individual values will be disclosed. Various techniques can be employed in order to ensure the confidentiality of individual records and other sensitive information. They include adding noise to the original data, so that disclosing perturbed data does not necessarily reveal the confidential individual values. Some techniques were developed specifically for mining vertically and/or horizontally partitioned data. In this scenario each partition belongs to a different party (e.g., a hospital), and no party is willing to share their data but they all have interest in mining the total data set comprising all of the partitions. There are other techniques that focus on protecting confidentiality of logic rules and patterns discovered from data. In this chapter we introduce the main issues in privacy-preserving data mining, provide a classification of existing techniques and survey the most important results in this area. | en |
dc.language | en | en |
dc.publisher | Springer | en |
dc.relation.ispartof | Security, Privacy, and Trust in Modern Data Management | en |
dc.relation.ispartofseries | Data-Centric Systems and Applications. | en |
dc.title | Privacy-Preserving Data Mining | en |
dc.type | Book Chapter | en |
dc.identifier.doi | 10.1007/978-3-540-69861-6_11 | en |
local.contributor.firstname | Ljiljana | en |
local.contributor.firstname | Zahidul | en |
local.contributor.firstname | Helen | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | B1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | Germany | en |
local.format.startpage | 151 | en |
local.format.endpage | 165 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Brankovic | en |
local.contributor.lastname | Islam | en |
local.contributor.lastname | Giggins | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/62136 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Privacy-Preserving Data Mining | en |
local.output.categorydescription | B1 Chapter in a Scholarly Book | en |
local.search.author | Brankovic, Ljiljana | en |
local.search.author | Islam, Zahidul | en |
local.search.author | Giggins, Helen | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.isrevision | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2007 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/566eed3f-4709-4202-a2fe-00c259a4f6ca | en |
local.subject.for2020 | 460402 Data and information privacy | en |
local.subject.seo2020 | 220499 Information systems, technologies and services not elsewhere classified | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Book Chapter School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
Page view(s)
144
checked on Sep 8, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.