Privacy-Preserving Data Mining Techniques: Mini Review
Abstract
Privacy-Preserving Data Mining (PPDM) has emerged as a crucial field
addressing the conflicting goals of maximizing data utility while protecting individual
privacy. This paper provides a comprehensive review of key PPDM techniques and models,
examining their strengths, weaknesses, and applications across various domains. We
analyze foundational privacy models such as Differential Privacy and K-anonymity, and
categorize major PPDM techniques including Data Perturbation, Data Anonymization,
and Cryptographic Methods. The paper evaluates these methods across different sectors
including healthcare, finance, and social media, highlighting domain-specific trade-offs
between privacy protection and data utility. We also explore emerging trends in PPDM,
particularly focusing on privacy-preserving machine learning models and tools for big
data environments. Finally, we identify significant challenges, such as scalability issues
with high-dimensional data and evolving privacy threats, that require continued research
attention to advance the field of privacy-preserving data mining.
References
Aggarwal, C., & Yu, P. S. (2008). Privacy-preserving data mining: Models and algorithms.
Springer.
Dwork, C. (2006). Differential privacy: A survey of results. Theory and Applications
of Models of Computation, 1-19.
Wu, X., Li, X., & Zhang, S. (2007). A survey on privacy-preserving data mining:
Theoretical framework and techniques. IEEE Transactions on Knowledge and Data
Engineering, 19(1), 1-21.
Joty, S., Liyanage, T. K., & others. (2020). Privacy-preserving machine learning:
Threats and solutions. ACM Computing Surveys, 53(4), 1-35.
A. K. Ilavarasi, B. Sathiyabhama, S. Poorani. Y. (2013). A Survey on Privacy Preserving
Data Mining Techniques.
G. Jelin Taric and E. Poovammal. Y. (2017). A Survey on Privacy Preserving Data
Mining Techniques.
Dwork, C. (2006). Differential privacy: A survey of results. Theory and Applications
of Models of Computation, 1-19.
Aggarwal, C., & Yu, P. S. (2008). Privacy-preserving data mining: Models and algorithms.
Springer.
Joty, S., Liyanage, T. K., & others. (2020). Privacy-preserving machine learning:
Threats and solutions. ACM Computing Surveys, 53(4), 1-35.
Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated learning: Challenges,
methods, and future directions. Springer Journal of Computer Science, 43(8), 99-120.
Privacy-Preserving Machine Learning: ML and Data Security by Vesselina Lezginov,
October 4, 2023. Available online: https://scopicsoftware.com/blog/
privacy-preserving-machine-learning/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 WAS Science Nature (WASSN) ISSN: 2766-7715

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.