Application Research of Data Mining Technology in Personal Privacy Protection and Material Data Analysis

被引:6
|
作者
Liu, Jianguo [1 ]
Zhou, Sheng [2 ]
机构
[1] Beijing Union Univ, Coll Appl Sci & Technol, Beijing, Peoples R China
[2] Wuhan Coll, Sch Finance & Econ, Wuhan, Hubei, Peoples R China
关键词
Data mining technology; privacy protection technology; data processing; information protection; WEB; NETWORK; SECURE;
D O I
10.1080/10584587.2021.1911255
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of information technology, the scale, scope and depth of database applications continue to expand, resulting in the phenomenon of "rich data and poor information." Misuse and misuse of data mining may lead to the leakage of user data, especially sensitive information. More and more people are worried about this, and even refuse to provide real data. Therefore, it is very necessary to study the application of data mining technology in personal privacy protection and material data analysis. The purpose of this article is to solve the problem of data privacy protection data mining. It mainly focuses on the research of privacy protection data mining algorithms. It uses Bayesian method analysis, theoretical analysis and logical analysis methods to carry out data mining technology in personal privacy protection and The application research in material data analysis shows that through the legal strengthening and management of data mining technology, the main reason is that data mining technology prohibits the illegal acquisition and use of other people's information on personal privacy, which can make the data mining data The security of the technology in privacy protection has been increased by 20%. In the analysis of material data, the data mining technology has greatly improved the number of processing and analysis capabilities compared to ordinary methods, which can increase the efficiency of material data analysis by 10%.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 50 条
  • [21] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [22] Data mining technology based on the visualization of enterprise human resources information data research
    Zhang, Yuqing
    Luo, Yongjiao
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 2489 - 2493
  • [23] Research of Network Teaching Platform based on the Technology of Data Mining
    Fan, Hongjun
    Kang, Dong
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 331 - 334
  • [24] Application of data mining technology in college mental health education
    Sun, Xiaocong
    FRONTIERS IN PSYCHOLOGY, 2022, 13
  • [25] The Application of Data Mining Technology in the Breakdown Maintenance of Warship Equipment
    Rong, Hua
    Chen, Mingrong
    Wang, Zhen
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 25 - 29
  • [26] Application of Data Mining Technology in the Early Warning of Safety Risks
    Yang, Wenxuan
    Liu, Yi
    PROCEEDINGS OF 2021 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS '21), 2021,
  • [27] Application of Data Mining Technology in Anti Electricity Theft System
    Lv, Weijia
    Chen, Juan
    Sun, Yuanxiang
    Xu, Di
    Liu, Xue
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON POWER ELECTRONICS AND ARTIFICIAL INTELLIGENCE, PEAI 2024, 2024, : 752 - 757
  • [28] Application of Data Mining Technology in the Subject Tactical Teaching of Badminton
    Yang, Delin
    INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2018, 13 (07) : 30 - 42
  • [29] Study on Application of Customer Segmentation Based on Data Mining Technology
    Gong, Huaping
    Xia, Qiong
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 167 - 170
  • [30] A comprehensive review on privacy preserving data mining
    Aldeen, Yousra Abdul Alsahib S.
    Salleh, Mazleena
    Razzaque, Mohammad Abdur
    SPRINGERPLUS, 2015, 4 : 1 - 36