TY - CHAP
T1 - Privacy-preserving data mining from outsourced databases
AU - Giannotti, Fosca
AU - Lakshmanan, Laks V.S.
AU - Monreale, Anna
AU - Pedreschi, Dino
AU - Wang, Hui
PY - 2011
Y1 - 2011
N2 - Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-service: a company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the outsourced database and the knowledge extract from it by data mining are considered private property of the data owner. To protect corporate privacy, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns received from the server. In this paper, we study the problem of outsourcing a data mining task within a corporate privacy-preserving framework. We propose a scheme for privacy-preserving outsourced mining which offers a formal protection against information disclosure, and show that the data owner can recover the correct data mining results efficiently.
AB - Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-service: a company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the outsourced database and the knowledge extract from it by data mining are considered private property of the data owner. To protect corporate privacy, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns received from the server. In this paper, we study the problem of outsourcing a data mining task within a corporate privacy-preserving framework. We propose a scheme for privacy-preserving outsourced mining which offers a formal protection against information disclosure, and show that the data owner can recover the correct data mining results efficiently.
UR - http://www.scopus.com/inward/record.url?scp=84870939251&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84870939251&partnerID=8YFLogxK
U2 - 10.1007/978-94-007-0641-5_19
DO - 10.1007/978-94-007-0641-5_19
M3 - Chapter
AN - SCOPUS:84870939251
SN - 9789400706408
SP - 411
EP - 426
BT - Computers, Privacy and Data Protection
ER -