There is no way that you can't decrypt the data, but your software can do it, as long as you have control over your software.
Somewhere needs to be a key so the software can decrypt the data, and if the software runs on a computer where you have access, you can get to the key. No way around this.
Your clients either have to trust you to not do anything malicious with the data, or they have to do the processing themselves (or with another service).
There might some ways to use homomorphic encryption (i.e. where you have enc(f1(a,b)) = f2(enc(a), enc(b))
for a pair of functions f1
, f2
), but this will only do for some very limited operations, encryption schemes specially made to support this, and quite likely not for stuff where your "data mining" is necessary.