Privacy-preserving data integration and sharing

Chris Clifton*, Murat Kantarcioǧlu, An Hai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed Elmagarmid, Dan Suciu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

148 Citations (Scopus)

Abstract

Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume data has integration has been accomplished. Data integration methods are seriously hampered by inability to share the data to be integrated. This paper lays out a privacy framework for data integration. Challenges for data integration in the context of this framework are discussed, in the context of existing accomplishments in data integration. Many of these challenges are opportunities for the data mining community.

Original languageEnglish
Title of host publicationWorkshop Proceedings - The 9th Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, In Conjunction with ACM SIGMOD International Conference on Management of Data, SIGMOD-04
Pages19-26
Number of pages8
DOIs
Publication statusPublished - 2004
Externally publishedYes
Event9th Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, In Conjunction with ACM SIGMOD International Conference on Management of Data, SIGMOD-04 - Paris, France
Duration: 13 Jun 200413 Jun 2004

Publication series

NameProceedings of the ACM SIGMOD International Conference on Management of Data
ISSN (Print)0730-8078

Conference

Conference9th Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, In Conjunction with ACM SIGMOD International Conference on Management of Data, SIGMOD-04
Country/TerritoryFrance
CityParis
Period13/06/0413/06/04

Keywords

  • H.2.5 [DatabaseManagement]: Heterogeneous Databases
  • H.2.7 [Database Management]: Database Administration - Security, integrity, and protection
  • H.2.8 [Database Management]: Database Applications - Data mining
  • Security

Fingerprint

Dive into the research topics of 'Privacy-preserving data integration and sharing'. Together they form a unique fingerprint.

Cite this