Research on the Personalized Privacy Preserving Distributed Data Mining

被引:3
作者
Shen, Yanguang [1 ]
Shao, Hui [1 ]
Li, Yan [1 ]
机构
[1] Hebei Univ Engn, Sch Informat Sci & Elect Engn, Handan, Peoples R China
来源
2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009 | 2009年
关键词
personalized privacy preserving; distributed data mining; decision tree classification; SMC; K-anonymity;
D O I
10.1109/FITME.2009.115
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we studied privacy preserving distributed data mining.The existing methods focus on a universal approach that exerts preservation in the same degree for all persons, without catering for their concrete needs. In view of this we innovatively proposed a new framework combining the Secure Multiparty Computation(SMC) with K-anonymity technology, and achieved personalized privacy preserving distributed data mining based on decision tree classification algorithm. Compared with other algorithms our methord could make a good trade-off point between privacy and accuracy, with high efficiency and low-overhead of computing and communication.
引用
收藏
页码:436 / 439
页数:4
相关论文
共 50 条
  • [31] A Case Study on Privacy Threats and Research Challenges in Privacy Preserving Data Analytics
    Rao, P. Ram Mohan
    Krishna, S. Murali
    Kumar, A. P. Siva
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 185 - 188
  • [32] A Privacy Preserving Personalized Group Recommendation Framework
    Ahmed, Kazi Wasif
    Mouri, Israt Jahan
    Zaman, Rianon
    Yeasmin, Nilufa
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 594 - 598
  • [33] Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
    Zhu, Dan
    Li, Xiao-Bai
    Wu, Shuning
    [J]. DECISION SUPPORT SYSTEMS, 2009, 48 (01) : 133 - 140
  • [34] A hybrid multi-group approach for privacy-preserving data mining
    Zhouxuan Teng
    Wenliang Du
    [J]. Knowledge and Information Systems, 2009, 19 : 133 - 157
  • [35] A hybrid multi-group approach for privacy-preserving data mining
    Teng, Zhouxuan
    Du, Wenliang
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 19 (02) : 133 - 157
  • [36] Utility Promises of Self-Organising Maps in Privacy Preserving Data Mining
    Mohammed, Kabiru
    Ayesh, Aladdin
    Boiten, Eerke
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 55 - 72
  • [37] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487
  • [38] Privacy preserving data mining algorithms without the use of secure computation or perturbation
    Gurevich, Alex
    Gudes, Ehud
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
  • [39] A Chaos-based Multiplicative Perturbation Scheme for Privacy Preserving Data Mining
    Luo, Zhifeng
    Wen, Congmin
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 941 - 944
  • [40] Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (01) : 63 - 78