Research on Privacy-Preserving Technology of Data Mining

被引:1
|
作者
Shen, Yanguang [1 ]
Han, Junrui [1 ]
HuiShao [1 ]
机构
[1] Hebei Univ Engn, Sch Informat & Elect Engn, Handan, Peoples R China
来源
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS | 2009年
关键词
data mining; privacy-preserving; association rule; classification mining; clustering mining;
D O I
10.1109/ICICTA.2009.382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been a significant research subject that how to extract valuable knowledge in data and to preserve private or sensitive information in data mining process from leaking. By comparing and analyzing privacy-preserving data mining algorithm, the paper has established the classification frame of privacy-preserving algorithm, found the opening of present privacy-preserving technology study and meanwhile prospected privacy-preserving research orientation.
引用
收藏
页码:612 / 614
页数:3
相关论文
共 50 条
  • [1] Study of privacy-preserving data mining
    Dai, Guangming
    Zhou, Xingeng
    Wang, Maocai
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 412 - 414
  • [2] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [3] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [4] A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User
    Cai, Li
    Su, JianYing
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 25 - +
  • [5] Privacy-preserving data mining systems
    Zhang, Nan
    Zhao, Wei
    COMPUTER, 2007, 40 (04) : 52 - +
  • [6] Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice
    Fu, Lixin
    Nemati, Hamid
    Sadri, Fereidoon
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (01) : 47 - 64
  • [7] PrivPy: General and Scalable Privacy-Preserving Data Mining
    Li, Yi
    Xu, Wei
    KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 1299 - 1307
  • [8] Privacy-preserving data mining in electronic surveys
    Zhan, J
    Matwin, S
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185
  • [9] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [10] Hybrid Transformation in Privacy-Preserving Data Mining
    Putri, Awalia W.
    Hira, Laksmiwati
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2016,