Privacy-Preserving Outsourcing of Data Mining

Anna Monreale, Wendy Hui Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Data mining is gaining momentum in society due to the ever increasing availability of large amounts of data, easily gathered by a variety of collection technologies and stored via computer systems. Due to the limited computational resources of data owners and the developments in cloud computing, there has been considerable recent interest in the paradigm of data mining-as-a-service (DMaaS). In this paradigm, a company (data owner) lacking in expertise or computational resources outsources its mining needs to a third party service provider (server). Given the fact that the server may not be fully trusted, one of the main concerns of the DMaaS paradigm is the protection of data privacy. In this paper, we provide an overview of a variety of techniques and approaches that address the privacy issues of the DMaaS paradigm.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference Workshops, COMPSAC 2016
EditorsLing Liu, Dejan Milojicic, Zhiyong Zhang, Zhiyong Zhang, Sheikh Iqbal Ahamed, Hiroyuki Sato, Stevlio Cimato, William Claycomb, Sorel Reisman, Motonori Nakamura, Chung Horng Lung, Mihhail Matskin
Pages583-588
Number of pages6
ISBN (Electronic)9781467388450
DOIs
StatePublished - 24 Aug 2016
Event2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016 - Atlanta, United States
Duration: 10 Jun 201614 Jun 2016

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume2
ISSN (Print)0730-3157

Conference

Conference2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016
Country/TerritoryUnited States
CityAtlanta
Period10/06/1614/06/16

Keywords

  • Outsourcing
  • Privacy
  • data mining

Fingerprint

Dive into the research topics of 'Privacy-Preserving Outsourcing of Data Mining'. Together they form a unique fingerprint.

Cite this