Abstract
With the applications of big data and cloud computing technologies in industries, data mining technologies have been developing rapidly in these years. However, privacy issues have been attracting attentions for users and researchers since the laws and regulations of protecting personal information are issued. How to appropriately apply data mining technologies while meeting the privacy protection requirements become an important problem to address. In this paper, the privacy preserving data mining technologies are studied including K-means, Support Vector Machine, decision tree and association rule mining. In addition to their principles, the corresponding privacy protection methods for them are discussed. Furthermore, the commonly used privacy protection methods are studied including restricted release, searchable symmetric encryption, homomorphic encryption and digital envelope. Finally, the suggestions are given that the data processing algorithms need to be improved to obtain the better balance between data mining efficiency and privacy protection, and the system could be designed to provide privacy protection measures to meet personalized demands. The studies in this paper are expected to provide technical ideas to various service providers such as personal recommendation to implement privacy protection strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, X., Zhu, X., Wu, G.-Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97–107 (2014)
Mahmud, M.S., Huang, J.Z., Salloum, S., Emara, T.Z., Sadatdiynov, K.: A survey of data partitioning and sampling methods to support big data analysis. Big Data Min. Analytics 3(2), 85–101 (2020)
Gan, H.: Research on data mining method based on privacy protection. In: 2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), pp. 502–506 (2020)
Su, X., Fan, K., Shi, W.: Privacy-preserving distributed data fusion based on attribute protection. IEEE Trans. Industr. Inf. 15(10), 5765–5777 (2019)
Zigomitros, A., Casino, F., Solanas, A., Patsakis, C.: A survey on privacy properties for data publishing of relational data. IEEE Access 8, 51071–51099 (2020)
Binjubeir, M., Ahmed, A.A., Ismail, M.A.B., Sadiq, A.S., Khan, M.K.: Comprehensive survey on big data privacy protection. IEEE Access 8, 20067–20079 (2020)
Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239–258 (2021)
Wang, X., Luo, W., Bai, X., Wang, Y. Research on big data security and privacy risk governance. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), pp. 15–18 (2021)
Lv, C. The Dilemma and Countermeasures of Personal Privacy Protection in the Era of Big Data. 2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI), pp. 335–338 (2022)
Venkatachalam, K., Reddy, V.P., Amudhan, M., Raguraman, A., Mohan, E.: an implementation of k-means clustering for efficient image segmentation. In: 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 224–229 (2021)
Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Industr. Inf. 13(4), 2066–2076 (2017)
Lu, Z., Shen, H.: Differentially private k-means clustering with convergence guarantee. IEEE Trans. Dependable Secure Comput. 18(4), 1541–1552 (2021)
Lv, Z., Wei, L., Chen, Y., Liu, Y., Li, C., Peng, D.: Differential privacy algorithm for integrated energy system based on improved k-means. In: 2021 6th International Conference on Power and Renewable Energy (ICPRE), pp. 1359–1363 (2021)
Mohan, L., Pant, J., Suyal, P., Kumar, A.: Support vector machine accuracy improvement with classification. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 477–481 (2020)
Sun, X., Zhang, Z., Huang, W. Privacy-preserving SVM classification algorithm based on negative database. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1402–1407 (2022)
Wang, J., Wu, L., Wang, H., Choo, K.-K.R., He, D.: An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet Things J. 8(1), 458–473 (2021)
Chen, Y., Mao, Q., Wang, B., Duan, P., Zhang, B., Hong, Z.: Privacy-preserving multi-class support vector machine model on medical diagnosis. IEEE J. Biomed. Health Inform. 26(7), 3342–3353 (2022)
Yang, F.-J.: An extended idea about decision trees. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 349–354 (2019)
Ding, S., Cao, Z., Dong, X.: Efficient privacy preserving decision tree inference service. In: 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), pp. 512–516 (2020)
Liang, J., Qin, Z., Xiao, S., Ou, L., Lin, X.: Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Dependable Secure Comput. 18(4), 1632–1644 (2021)
Zhang, L., Wang, W., Zhang, Y.: Privacy preserving association rule mining: taxonomy, techniques, and metrics. IEEE Access 7, 45032–45047 (2019)
Shi, Z., Fu, X., Li, X., Zhu, K.: ESVSSE: enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans. Knowl. Data Eng. 34(7), 3241–3254 (2022)
Wu, J., Mu, N., Lei, X., Le, J., Zhang, D., Liao, X.: SecEDMO: enabling efficient data mining with strong privacy protection in cloud computing. IEEE Trans. Cloud Comput. 10(1), 691–705 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
He, J., Cai, R., Lei, S., Wu, D. (2023). Research on Privacy Protection Methods for Data Mining. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_44
Download citation
DOI: https://doi.org/10.1007/978-981-99-3300-6_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3299-3
Online ISBN: 978-981-99-3300-6
eBook Packages: Computer ScienceComputer Science (R0)