Research on the Personalized Privacy Preserving Distributed Data Mining

被引:3
|
作者
Shen, Yanguang [1 ]
Shao, Hui [1 ]
Li, Yan [1 ]
机构
[1] Hebei Univ Engn, Sch Informat Sci & Elect Engn, Handan, Peoples R China
来源
2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009 | 2009年
关键词
personalized privacy preserving; distributed data mining; decision tree classification; SMC; K-anonymity;
D O I
10.1109/FITME.2009.115
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we studied privacy preserving distributed data mining.The existing methods focus on a universal approach that exerts preservation in the same degree for all persons, without catering for their concrete needs. In view of this we innovatively proposed a new framework combining the Secure Multiparty Computation(SMC) with K-anonymity technology, and achieved personalized privacy preserving distributed data mining based on decision tree classification algorithm. Compared with other algorithms our methord could make a good trade-off point between privacy and accuracy, with high efficiency and low-overhead of computing and communication.
引用
收藏
页码:436 / 439
页数:4
相关论文
共 50 条
  • [1] Research on distributed privacy-preserving data mining
    Jia, Zhe
    Pang, Lei
    Luo, Shoushan
    Xin, Yang
    Zhang, Miao
    Journal of Convergence Information Technology, 2012, 7 (01) : 356 - 367
  • [2] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [3] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [4] Study on distributed privacy preserving data mining
    Wang, Binli
    Shen, Yanguang
    WORLD JOURNAL OF ENGINEERING, 2014, 11 (02) : 163 - 169
  • [5] Privacy Preserving Distributed Data Mining with Evolutionary Computing
    Jena, Lambodar
    Kamila, Narendra Ku.
    Mishra, Sushruta
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2013, 2014, 247 : 259 - 267
  • [6] Privacy Preserving Mining of Distributed Data Using Steganography
    Kumari, D. Aruna
    Rao, K. Raja Sekhar
    Suman, M.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 263 - 269
  • [7] Data mining privacy preserving: Research agenda
    Kreso, Inda
    Kapo, Amra
    Turulja, Lejla
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2021, 11 (01)
  • [8] Recent research on privacy preserving data mining
    Gurevich, Alex
    Gudes, Ehud
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 377 - +
  • [9] Privacy Preserving Data Mining Technique to Secure Distributed Client Data
    Dani, Virendra
    Kokate, Priyanka
    Kushwah, Surbhi
    Waghela, Swapnil
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 565 - 574
  • [10] Privacy Preserving in Distributed SVM Data Mining on Vertical Partitioned Data
    Omer, Mohammed Z.
    Gao, Hui
    Sayed, Faisal
    2016 3RD INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE (ISCMI 2016), 2016, : 84 - 89