A new algorithm-independent method for privacy-preserving data mining

被引:0
|
作者
机构
[1] School of Electronic and Control Engineering, Chang'an University
[2] School of Computer Science and Technology, Harbin Institute of Technology
来源
Li, G. (hit6006@126.com) | 1600年 / Binary Information Press卷 / 10期
关键词
Data mining; Data perturbation; Privacy preserving;
D O I
10.12733/jcis9295
中图分类号
学科分类号
摘要
With the development of data mining technologies, privacy protection is becoming a challenge for data mining applications in many fields. To solve this problem, many PPDM (privacy-preserving data mining) methods have been proposed. One important type of PPDM method is based on data perturbation. Only part of the data-perturbation-based methods is algorithm-irrelevant, which are favorable because common data mining algorithms can be used directly. This paper proposes a new algorithm-irrelevant PPDM method based on data perturbation. Our method generates a new data set that is different from and has the same distribution as the original data set. Our experiments show that this new method can produce usable data while protecting privacy well. © 2014 Binary Information Press.
引用
收藏
页码:1473 / 1480
页数:7
相关论文
共 50 条
  • [1] A new algorithm-independent method for privacy-preserving classification based on sample generation
    School of Electronic and Control Engineering, Chang’an University, Xi’an
    Shaanxi
    710064, China
    Open. Cybern. Syst. J., 1 (443-447): : 443 - 447
  • [2] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [3] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [4] A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User
    Cai, Li
    Su, JianYing
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 25 - +
  • [5] Study of privacy-preserving data mining
    Dai, Guangming
    Zhou, Xingeng
    Wang, Maocai
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 412 - 414
  • [6] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
  • [7] A New Scheme to Privacy-Preserving Collaborative Data Mining
    Zhu, Jianming
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 468 - 471
  • [8] An improved algorithm for privacy-preserving data mining based on NMF
    Li, Guang
    Xi, Meng
    Journal of Information and Computational Science, 2015, 12 (09): : 3423 - 3430
  • [9] An incremental algorithm for mining privacy-preserving frequent itemsets
    Wang, Jin-Long
    Xu, Cong-Fu
    Pan, Yun-He
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1132 - +
  • [10] Privacy-Preserving Data Mining Algorithm Based on Modified Particle Swarm Optimization
    Yang, Lei
    Wu, Jue
    Peng, Lingxi
    Liu, Feng
    INTELLIGENT COMPUTING METHODOLOGIES, 2014, 8589 : 529 - 541