{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T23:40:01Z","timestamp":1750808401244,"version":"3.41.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319656359"},{"type":"electronic","value":"9783319656366"}],"license":[{"start":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T00:00:00Z","timestamp":1502928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-65636-6_44","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T04:13:28Z","timestamp":1502856808000},"page":"491-502","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Preserving Data Mining on Big Data Computing Platform: Trends and Future"],"prefix":"10.1007","author":[{"given":"Gao","family":"Zhiqiang","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Longjun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1504\/IJSSC.2015.070945","volume":"5","author":"D Chasaki","year":"2015","unstructured":"Chasaki, D., Mansour, C.: Security challenges in the Internet of Things. Int. J. Space Based Situated Comput. 5, 141\u2013149 (2015)","journal-title":"Int. J. Space Based Situated Comput."},{"key":"44_CR2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4018\/IJTHI.2016010102","volume":"12","author":"A Beldad","year":"2016","unstructured":"Beldad, A.: Sealing one\u2019s online wall off from outsiders: determinants of the use of Facebook\u2019s privacy settings among young Dutch users. Int. J. Technol. Hum. Interact. (IJTHI) 12, 21\u201334 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"key":"44_CR3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1504\/IJGUC.2012.047768","volume":"3","author":"M Barhamgi","year":"2012","unstructured":"Barhamgi, M., Benslimane, D., Ghedira, C.: PPPDM\u2013a privacy-preserving platform for data mashup. Int. J. Grid Util. Comput. 3, 175\u2013187 (2012)","journal-title":"Int. J. Grid Util. Comput."},{"key":"44_CR4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.4018\/IJTHI.2016040103","volume":"12","author":"X Li","year":"2016","unstructured":"Li, X., He, Y., Niu, B.: An exact and efficient privacy-preserving spatiotemporal matching in mobile social networks. Int. J. Technol. Hum. Interact. (IJTHI) 12, 36\u201347 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"key":"44_CR5","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1504\/IJGUC.2013.057120","volume":"4","author":"R Petrlic","year":"2013","unstructured":"Petrlic, R., Sekula, S., Sorge, C.: A privacy-friendly architecture for future cloud computing. Int. J. Grid Util. Comput. 4, 265\u2013277 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"key":"44_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1002\/sam.10029","volume":"2","author":"Y Duan","year":"2009","unstructured":"Duan, Y., Canny, J.: How to deal with malicious users in privacy-preserving distributed data mining. Stat. Anal. Data Min. 2, 18\u201333 (2009)","journal-title":"Stat. Anal. Data Min."},{"key":"44_CR7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.4018\/IJITWE.2016070104","volume":"11","author":"N Khan","year":"2016","unstructured":"Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 50\u201364 (2016)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"44_CR8","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1504\/IJGUC.2016.073778","volume":"7","author":"W Zhang","year":"2016","unstructured":"Zhang, W., Jiang, S., Zhu, X.: Cooperative downloading with privacy preservation and access control for value-added services in VANETs. Int. J. Grid Util. Comput. 7, 50\u201360 (2016)","journal-title":"Int. J. Grid Util. Comput."},{"key":"44_CR9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4018\/IJITWE.2016070105","volume":"11","author":"M Almiani","year":"2016","unstructured":"Almiani, M., Razaque, A., Al, D.A.: Privacy preserving framework to support mobile government services. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 65\u201378 (2016)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"44_CR10","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1142\/S0219622006002258","volume":"5","author":"Q Yang","year":"2006","unstructured":"Yang, Q., Wu, X.: 10 challenging problems in data mining research. Int. J. Inf. Technol. Decis. Making 5, 597\u2013604 (2006)","journal-title":"Int. J. Inf. Technol. Decis. Making"},{"key":"44_CR11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28, 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Su, D., Cao, J., Li, N.: Differentially private k-means clustering. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 26\u201337 (2016)","key":"44_CR12","DOI":"10.1145\/2857705.2857708"},{"unstructured":"Samet, S., Miri, A., Orozco-Barbosa, L.: Privacy preserving k-means clustering in multi-party environment. In: SECRYPT, pp. 381\u2013385 (2016)","key":"44_CR13"},{"doi-asserted-by":"crossref","unstructured":"Doganay, M.C., Pedersen, T.B., Saygin, Y.: Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, pp. 3\u201311 (2008)","key":"44_CR14","DOI":"10.1145\/1379287.1379291"},{"key":"44_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-13601-6_17","volume-title":"Intelligence and Security Informatics","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri, Anoop M., Srinathan, K., Jawahar, C.V.: Efficient privacy preserving k-means clustering. In: Chen, H., Chau, M., Li, S.-h., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 154\u2013166. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13601-6_17"},{"key":"44_CR16","doi-asserted-by":"crossref","first-page":"82","DOI":"10.4018\/IJITWE.2015070106","volume":"10","author":"H Chen","year":"2015","unstructured":"Chen, H., Hu, Y., Lian, Z.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web Eng. (IJITWE) 10, 82\u2013102 (2015)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"unstructured":"Hadoop. http:\/\/hadoop.apache.org","key":"44_CR17"},{"unstructured":"Mllib. http:\/\/spark.apache.org\/mllib","key":"44_CR18"},{"unstructured":"Spark. http:\/\/spark.apache.org","key":"44_CR19"},{"key":"44_CR20","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 571\u2013588 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1 (2007)","key":"44_CR21","DOI":"10.1145\/1217299.1217302"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106\u2013115 (2007)","key":"44_CR22","DOI":"10.1109\/ICDE.2007.367856"},{"unstructured":"Guo, Y.: Reconstruction-based association rule hiding. In: Proceedings of SIGMOD 2007 Ph. D. Workshop on Innovative Database Research, pp. 51\u201356 (2007)","key":"44_CR23"},{"key":"44_CR24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s10619-007-7013-0","volume":"22","author":"VS Verykios","year":"2007","unstructured":"Verykios, V.S., Pontikakis, E.D., Theodoridis, Y.: Efficient algorithms for distortion and blocking techniques in association rule hiding. Distrib. Parallel Databases 22, 85\u2013104 (2007)","journal-title":"Distrib. Parallel Databases"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, pp. 162\u2013167 (1986)","key":"44_CR25","DOI":"10.1109\/SFCS.1986.25"},{"doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with an honest majority. In: Proceedings of the Nineteenth Annual, vol. 87, pp. 218\u2013229 (1987)","key":"44_CR26","DOI":"10.1145\/28395.28420"},{"doi-asserted-by":"crossref","unstructured":"Franklin, M., Yung, M.: The varieties of secure distributed computation. In: Capocelli, R., De Santis, A., Vaccaro, U. (eds.) Sequences II, pp. 392\u2013417. Springer, New York (1993)","key":"44_CR27","DOI":"10.1007\/978-1-4613-9323-8_30"},{"key":"44_CR28","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54, 86\u201395 (2011)","journal-title":"Commun. ACM"},{"unstructured":"Fletcher, S., Islam, M.Z.: Decision tree classification with differential privacy: a survey. arXiv preprint arXiv:1611.01919 (2016)","key":"44_CR29"},{"doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W.: Security and privacy in cloud computing: a survey. In: 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), pp. 105\u2013112 (2010)","key":"44_CR30","DOI":"10.1109\/SKG.2010.19"},{"unstructured":"Roy, I., Setty, S.T., Kilzer, A.: Airavat: security and privacy for MapReduce. In: NSDI, pp. 297\u2013312 (2010)","key":"44_CR31"},{"doi-asserted-by":"crossref","unstructured":"Blass, E.O., Di Pietro, R., Molva, R., \u00d6nen, M.: PRISM \u2013 Privacy-Preserving Search in MapReduce. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 180\u2013200. Springer, Heidelberg (2012)","key":"44_CR32","DOI":"10.1007\/978-3-642-31680-7_10"},{"doi-asserted-by":"crossref","unstructured":"Gursoy, M., Inan, A., Nergiz, M.E.: Privacy-preserving learning analytics: challenges and techniques. IEEE Trans. Learn. Technol. (2016)","key":"44_CR33","DOI":"10.1109\/TLT.2016.2607747"},{"key":"44_CR34","doi-asserted-by":"crossref","first-page":"5099","DOI":"10.1016\/j.ijleo.2016.02.061","volume":"127","author":"W Kong","year":"2016","unstructured":"Kong, W., Lei, Y., Ma, J.: Virtual machine resource scheduling algorithm for cloud computing based on auction mechanism. Optik-Int. J. Light Electron Opt. 127, 5099\u20135104 (2016)","journal-title":"Optik-Int. J. Light Electron Opt."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Intelligent Networking and Collaborative Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65636-6_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:58:32Z","timestamp":1750805912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65636-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,17]]},"ISBN":["9783319656359","9783319656366"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65636-6_44","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,8,17]]}}}