Privacy-Preserving Data Mining Techniques: Mini Review

Authors

  • Fadeela Salim Ahosni
  • Rawiyah Khlifah Alamri
  • Taqwa Obaid Al-Hinai
  • Rabie A. Ramadan

Abstract

Privacy-Preserving Data Mining (PPDM) has emerged as a crucial field
addressing the conflicting goals of maximizing data utility while protecting individual
privacy. This paper provides a comprehensive review of key PPDM techniques and models,
examining their strengths, weaknesses, and applications across various domains. We
analyze foundational privacy models such as Differential Privacy and K-anonymity, and
categorize major PPDM techniques including Data Perturbation, Data Anonymization,
and Cryptographic Methods. The paper evaluates these methods across different sectors
including healthcare, finance, and social media, highlighting domain-specific trade-offs
between privacy protection and data utility. We also explore emerging trends in PPDM,
particularly focusing on privacy-preserving machine learning models and tools for big
data environments. Finally, we identify significant challenges, such as scalability issues
with high-dimensional data and evolving privacy threats, that require continued research
attention to advance the field of privacy-preserving data mining.

References

Aggarwal, C., & Yu, P. S. (2008). Privacy-preserving data mining: Models and algorithms.

Springer.

Dwork, C. (2006). Differential privacy: A survey of results. Theory and Applications

of Models of Computation, 1-19.

Wu, X., Li, X., & Zhang, S. (2007). A survey on privacy-preserving data mining:

Theoretical framework and techniques. IEEE Transactions on Knowledge and Data

Engineering, 19(1), 1-21.

Joty, S., Liyanage, T. K., & others. (2020). Privacy-preserving machine learning:

Threats and solutions. ACM Computing Surveys, 53(4), 1-35.

A. K. Ilavarasi, B. Sathiyabhama, S. Poorani. Y. (2013). A Survey on Privacy Preserving

Data Mining Techniques.

G. Jelin Taric and E. Poovammal. Y. (2017). A Survey on Privacy Preserving Data

Mining Techniques.

Dwork, C. (2006). Differential privacy: A survey of results. Theory and Applications

of Models of Computation, 1-19.

Aggarwal, C., & Yu, P. S. (2008). Privacy-preserving data mining: Models and algorithms.

Springer.

Joty, S., Liyanage, T. K., & others. (2020). Privacy-preserving machine learning:

Threats and solutions. ACM Computing Surveys, 53(4), 1-35.

Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated learning: Challenges,

methods, and future directions. Springer Journal of Computer Science, 43(8), 99-120.

Privacy-Preserving Machine Learning: ML and Data Security by Vesselina Lezginov,

October 4, 2023. Available online: https://scopicsoftware.com/blog/

privacy-preserving-machine-learning/

Downloads

Published

2025-04-01

How to Cite

Ahosni, F., Alamri, R. ., Al-Hinai, T. ., & Ramadan, R. (2025). Privacy-Preserving Data Mining Techniques: Mini Review. WAS Science Nature (WASSN) ISSN: 2766-7715, 1(1), 10. Retrieved from https://www.worldascience.com/journals/index.php/wassn/article/view/46

Issue

Section

Computer Science & Mathematics

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)