Research on Privacy-Preserving Technology of Data Mining

被引:1
作者
Shen, Yanguang [1 ]
Han, Junrui [1 ]
HuiShao [1 ]
机构
[1] Hebei Univ Engn, Sch Informat & Elect Engn, Handan, Peoples R China
来源
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS | 2009年
关键词
data mining; privacy-preserving; association rule; classification mining; clustering mining;
D O I
10.1109/ICICTA.2009.382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been a significant research subject that how to extract valuable knowledge in data and to preserve private or sensitive information in data mining process from leaking. By comparing and analyzing privacy-preserving data mining algorithm, the paper has established the classification frame of privacy-preserving algorithm, found the opening of present privacy-preserving technology study and meanwhile prospected privacy-preserving research orientation.
引用
收藏
页码:612 / 614
页数:3
相关论文
共 50 条
[21]   DAG: A General Model for Privacy-Preserving Data Mining [J].
Teo, Sin G. ;
Cao, Jianneng ;
Lee, Vincent C. S. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (01) :40-53
[22]   Privacy-Preserving in the Context of Data Mining and Deep Learning [J].
Altalhi, Amjaad ;
Al-Saedi, Maram ;
Alsuwat, Hatim ;
Alsuwat, Emad .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06) :137-142
[23]   Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering [J].
Ouda, Mohamed ;
Salem, Sameh ;
Ali, Ihab ;
Saad, El-Sayed .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (06) :604-612
[24]   A DCT-based privacy-preserving approach for efficient data mining [J].
Tian, Feng ;
Gui, Xiaolin ;
An, Jian ;
Yang, Pan ;
Zhang, Xuejun ;
Zhao, Jianqiang .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3641-3652
[25]   Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining [J].
Merani, Maria Luisa ;
Croce, Daniele ;
Tinnirello, Ilenia .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (06) :1340-1352
[26]   A new algorithm-independent method for privacy-preserving data mining [J].
Li, Guang ;
Wang, Yadong ;
Su, Xiaohong .
Journal of Computational Information Systems, 2014, 10 (04) :1473-1480
[27]   Privacy-Preserving Data Mining in Spatiotemporal Databases Based on Mining Negative Association Rules [J].
Ranjith, K. S. ;
Mary, A. Geetha .
EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 :329-339
[28]   The Study of Privacy Preserving Data Mining Technology for Information Security [J].
Li, Heng ;
Wu, Xuefang .
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 :3532-3535
[29]   PRELIMINARY DATA ANALYSIS IN HEALTHCARE MULTICENTRIC DATA MINING: A PRIVACY-PRESERVING DISTRIBUTED APPROACH [J].
Damiani, Andrea ;
Masciocchi, Carlotta ;
Boldrini, Luca ;
Gatta, Roberto ;
Dinapoli, Nicola ;
Lenkowicz, Jacopo ;
Chiloiro, Giuditta ;
Gambacorta, Maria Antonietta ;
Tagliaferri, Luca ;
Autorino, Rosa ;
Pagliara, Monica Maria ;
Blasi, Maria Antonietta ;
van Soest, Johan ;
Dekker, Andre ;
Valentini, Vincenzo .
JOURNAL OF E-LEARNING AND KNOWLEDGE SOCIETY, 2018, 14 (01) :71-81
[30]   Random-data perturbation techniques and privacy-preserving data mining [J].
Kargupta, H ;
Datta, S ;
Wang, Q ;
Sivakumar, K .
KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) :387-414