A Privacy-Enhancing Architecture for Databases

Innovative approaches to searching for hidden meaning in data have recently emerged. In some cases, however, the support of privacy is compromised and consistent privacy protection remains elusive. Privacy perceptions and requirements differ from person to person and over time, leading to diverse privacy preferences within a community. This paper reports on a privacy-enhancing database architecture that is premised upon this view of privacy and on Australia's Use and Disclosure National Privacy Principle. The approach extends to supporting privacy under Knowledge Discovery and Data Mining.

[1]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[2]  Athman Bouguettaya,et al.  Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..

[3]  Jayant R. Haritsa,et al.  Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.

[4]  R. Cushman,et al.  Information and medical ethics: protecting patient privacy , 1996 .

[5]  David A. Wagner,et al.  Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.

[6]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[7]  K. A. Taipale,et al.  Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd , 2004 .

[8]  Gregory Piatetsky-Shapiro,et al.  Data mining and knowledge discovery 1996 to 2005: overcoming the hype and moving from “university” to “business” and “analytics” , 2007, Data Mining and Knowledge Discovery.

[9]  J. Rubenfeld The Right of Privacy , 1989 .

[10]  J. Rachels Why privacy is important , 1985 .

[11]  Yunfeng Wang,et al.  Privacy Preserving Data Mining Research: Current Status and Key Issues , 2007, International Conference on Computational Science.

[12]  Thomas M. Cooley,et al.  A treatise on the law of torts, or, The wrongs which arise independent of contract. , 1993 .

[13]  S. Fischer-h bner IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[14]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[15]  Mikhail J. Atallah,et al.  A secure protocol for computing dot-products in clustered and distributed environments , 2002, Proceedings International Conference on Parallel Processing.

[16]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[17]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[18]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[19]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[20]  Elisa Bertino,et al.  A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.

[21]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[22]  L. Janczewski New challenges in privacy protection , 2003 .

[23]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[24]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[25]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[26]  Vladimir A. Oleshchuk,et al.  Personal Privacy in a Digital World , 2007 .

[27]  Thomas B. Hodel-Widmer Designing databases that enhance people’s privacy without hindering organizations , 2006, Ethics and Information Technology.

[28]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[29]  L. Floridi Four challenges for a theory of informational privacy , 2006, Ethics and Information Technology.

[30]  Felix B. Tan Advanced Topics In Global Information Management , 2003 .

[31]  Andrew Charlesworth Clash of the Data Titans?: US and EU Data Privacy Regulation , 2000 .

[32]  Eugene Volokh,et al.  Personalization and privacy , 2000, CACM.

[33]  R. Gavison Privacy and the Limits of Law , 1980 .

[34]  R. Hes,et al.  Privacy-Enhancing Technologies: The Path to Anonymity , 1998 .

[35]  Vassilios S. Verykios,et al.  Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).

[36]  Julia Brande Earp,et al.  Internet privacy law: a comparison between the United States and the European Union , 2004, Comput. Secur..

[37]  Simon Rogerson,et al.  Ethics and Information Technology , 1997, Australas. J. Inf. Syst..