Secure Computation for Privacy Preserving Data Mining

Secure Computation for Privacy Preserving Data Mining

Author: 
Lindell, Yehuda
Place: 
Hershey
Publisher: 
IGI Global
Date published: 
2008
Editor: 
Wang, John
Journal Title: 
Encyclopedia of Data Warehousing and Mining, Second Edition
Source: 
Encyclopedia of Data Warehousing and Mining, Second Edition
Subject: 
Abstract: 

The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual’s need and right to privacy. Privacy preserving data mining solutions achieve the somewhat paradoxical property of enabling a data mining algorithm to use data without ever actually “seeing” it. Thus, the benefits of data mining can be enjoyed, without compromising the privacy of concerned individuals.

CITATION: Lindell, Yehuda. Secure Computation for Privacy Preserving Data Mining edited by Wang, John . Hershey : IGI Global , 2008. Encyclopedia of Data Warehousing and Mining, Second Edition - Available at: https://library.au.int/secure-computation-privacy-preserving-data-mining