Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice

Privacy-preserving data mining (PPDM) refers to data mining techniques developed to protect sensitive data while allowing useful information to be discovered from the data. In this article, we review PPDM and present a broad survey of related issues, techniques, measures, applications, and regulation guidelines. We observe that the rapid pace of change in information technologies available to sustain PPDM has created a gap between theory and practice. We posit that without a clear understanding of the practice, this gap will be widening which, ultimately, will be detrimental to the field. We conclude by proposing a comprehensive research agenda intended to bridge the gap relevant to practice and as a reference basis for the future related legislation activities.

[1]  R. Winer A Framework for Customer Relationship Management , 2001 .

[2]  Gurpreet Dhillon,et al.  Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..

[3]  R. Mason Four ethical issues of the information age , 1986 .

[4]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[5]  Lawrence Oliva Information Technology Security: Advice from Experts , 2004 .

[6]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[7]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[9]  Jeff Smith,et al.  Privacy policies and practices: inside the organizational maze , 1993, CACM.

[10]  Chong K. Liew,et al.  A data distortion by probability distribution , 1985, TODS.

[11]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[12]  James C. Wetherbe,et al.  Key Issues in Information Systems Management: 1994-95 SIM Delphi Results , 1996, MIS Q..

[13]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[14]  Dorothy E. Denning,et al.  Secure statistical databases with random sample queries , 1980, TODS.

[15]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[16]  Hamid R. Nemati,et al.  Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .

[17]  Fred Niederman,et al.  Information Systems Management Issues for the 1990s , 1991, MIS Q..

[18]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[19]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[20]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[21]  L. Gostin,et al.  Legal issues concerning electronic health information: privacy, quality, and liability. , 1999, JAMA.

[22]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[23]  Shan Ling Pan,et al.  Using e-CRM for a unified view of the customer , 2003, CACM.

[24]  Chris Clifton,et al.  Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.

[25]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[26]  Elisa Bertino,et al.  Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.