Research on Privacy-Preserving Technology of Data Mining

被引:1
作者
Shen, Yanguang [1 ]
Han, Junrui [1 ]
HuiShao [1 ]
机构
[1] Hebei Univ Engn, Sch Informat & Elect Engn, Handan, Peoples R China
来源
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS | 2009年
关键词
data mining; privacy-preserving; association rule; classification mining; clustering mining;
D O I
10.1109/ICICTA.2009.382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been a significant research subject that how to extract valuable knowledge in data and to preserve private or sensitive information in data mining process from leaking. By comparing and analyzing privacy-preserving data mining algorithm, the paper has established the classification frame of privacy-preserving algorithm, found the opening of present privacy-preserving technology study and meanwhile prospected privacy-preserving research orientation.
引用
收藏
页码:612 / 614
页数:3
相关论文
共 10 条
[1]  
Agrawal R., 2000, Privacy-preserving data mining, P439, DOI DOI 10.1145/342009.335438
[2]  
DU WL, 2002, WORKSH PRIV SEC DAT, V14
[3]  
GENG B, 2008, TEMPORAL RULE DISTRI
[4]  
KANTARCIOGLU M, 2002, ACM SIGMOD WORKSH RE, P24
[5]   Privacy preserving data mining [J].
Lindell, Y ;
Pinkas, B .
JOURNAL OF CRYPTOLOGY, 2002, 15 (03) :177-206
[6]  
MERNGN S, 2003, P 3 IEEE INT C DAT M, P211
[7]  
Oleveira S R M, 2003, P 3 IEEE INT C DAT M
[8]  
VAIDYA J, 2002, 8 ACM SIGKDD INT C K, P639, DOI DOI 10.1145/775047.775142
[9]  
VERYKIOS VS, 2003, IEEE T KNOWLEDGE DAT
[10]  
2004, P INT WORKSH SEC DAT