Research on the Personalized Privacy Preserving Distributed Data Mining

被引:3
作者
Shen, Yanguang [1 ]
Shao, Hui [1 ]
Li, Yan [1 ]
机构
[1] Hebei Univ Engn, Sch Informat Sci & Elect Engn, Handan, Peoples R China
来源
2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009 | 2009年
关键词
personalized privacy preserving; distributed data mining; decision tree classification; SMC; K-anonymity;
D O I
10.1109/FITME.2009.115
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we studied privacy preserving distributed data mining.The existing methods focus on a universal approach that exerts preservation in the same degree for all persons, without catering for their concrete needs. In view of this we innovatively proposed a new framework combining the Secure Multiparty Computation(SMC) with K-anonymity technology, and achieved personalized privacy preserving distributed data mining based on decision tree classification algorithm. Compared with other algorithms our methord could make a good trade-off point between privacy and accuracy, with high efficiency and low-overhead of computing and communication.
引用
收藏
页码:436 / 439
页数:4
相关论文
共 50 条
  • [21] Collusion-Free Privacy Preserving Data Mining
    Rajalakshmi, M.
    Purusothaman, T.
    Pratheeba, S.
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2010, 6 (04) : 30 - 45
  • [22] A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining
    Nanavati, Nirali R.
    Jinwala, Devesh C.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 512 - 517
  • [23] Classification Rule Mining through SMC for Preserving Privacy Data Mining: A Review
    Gangrade, Alka
    Mishra, Durgesh Kumar
    Patel, Ravindra
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 431 - 434
  • [24] An Efficient Approach for Privacy Preserving Distributed Mining of Association Rules in Unsecured Environment
    Modi, Chirag N.
    Patil, Ashwini R.
    Doshi, Nishant
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 753 - 758
  • [25] An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases
    Kuba, Hasanien K.
    Azzawi, Mustafa A.
    Darwish, Saad M.
    Hassen, Oday A.
    Abdulhussein, Ansam A.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4119 - 4133
  • [26] Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
    El-Sisi, Ashraf
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2010, 7 (02) : 152 - 160
  • [27] Personalized extended (α, k)-anonymity model for privacy-preserving data publishing
    Liu, Xiangwen
    Xie, Qingqing
    Wang, Liangmin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (06)
  • [28] Privacy-preserving data mining: A feature set partitioning approach
    Matatov, Nissim
    Rokach, Lior
    Maimon, Oded
    INFORMATION SCIENCES, 2010, 180 (14) : 2696 - 2720
  • [29] Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects
    Malik, Majid Bashir
    Ghazi, M. Asger
    Ali, Rashid
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, : 26 - 32
  • [30] Research on Privacy Preserving Distributed C4. 5 Algorithm
    Shen, Yanguang
    Shao, Hui
    Huang, Jianzhong
    IITAW: 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATIONS WORKSHOPS, 2009, : 216 - +