Privacy-preserving data mining: why, how, and when

  title={Privacy-preserving data mining: why, how, and when},
  author={Jaideep Vaidya and Chris Clifton},
  journal={IEEE Security & Privacy Magazine},
Data mining is under attack from privacy advocates because of a misunderstanding about what it actually is and a valid concern about how it is generally done. This article shows how technology from the security community can change data mining for the better, providing all its benefits while still maintaining privacy. 
Highly Cited
This paper has 115 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 71 extracted citations

Privacy-Preserving Multi-Party Clustering: An Empirical Study

2017 IEEE 10th International Conference on Cloud Computing (CLOUD) • 2017
View 5 Excerpts
Highly Influenced

Individual Privacy and Organizational Privacy in Business Analytics

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) • 2007
View 6 Excerpts
Highly Influenced

LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering • 2015
View 4 Excerpts
Highly Influenced

Practical issues on privacy-preserving health data mining

PAKDD Workshops • 2007
View 3 Excerpts
Highly Influenced

Distributed Apriori on cloud plateform without exposing individual transaction data

2018 Tenth International Conference on Advanced Computational Intelligence (ICACI) • 2018

A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy

IEEE Transactions on Dependable and Secure Computing • 2017
View 1 Excerpt

115 Citations

Citations per Year
Semantic Scholar estimates that this publication has 115 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 16 references

Different approaches to privacy-preserving data mining. Depending on the approach taken, we see trade-offs among efficiency, accuracy, privacy, and security

M. Kantarcıoǧlu, C. Clifton, “Privacy-Preserving
View 1 Excerpt

Zaiane, “Protecting Sensitive Knowledge by Data Sanitization,

O.R.S.R.M. Oliveira
Proc. 3rd IEEE Int’l Conf. Data Mining (ICDM • 2003
View 1 Excerpt

Don’t Store My Data, Japanese Tell Government,

D. Struck
Int’l Herald Tribune, • 2002
View 2 Excerpts

Similar Papers

Loading similar papers…