Research on Privacy-Preserving Technology of Data Mining

被引:1
作者
Shen, Yanguang [1 ]
Han, Junrui [1 ]
HuiShao [1 ]
机构
[1] Hebei Univ Engn, Sch Informat & Elect Engn, Handan, Peoples R China
来源
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS | 2009年
关键词
data mining; privacy-preserving; association rule; classification mining; clustering mining;
D O I
10.1109/ICICTA.2009.382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been a significant research subject that how to extract valuable knowledge in data and to preserve private or sensitive information in data mining process from leaking. By comparing and analyzing privacy-preserving data mining algorithm, the paper has established the classification frame of privacy-preserving algorithm, found the opening of present privacy-preserving technology study and meanwhile prospected privacy-preserving research orientation.
引用
收藏
页码:612 / 614
页数:3
相关论文
共 50 条
[41]   Privacy-Preserving Clustering of Data Streams [J].
Chao, Ching-Ming ;
Chen, Po-Zung ;
Sun, Chu-Hao .
JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2010, 13 (03) :349-358
[42]   An incremental algorithm for mining privacy-preserving frequent itemsets [J].
Wang, Jin-Long ;
Xu, Cong-Fu ;
Pan, Yun-He .
PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, :1132-+
[43]   Quantitative association rules mining methods with privacy-preserving [J].
Chen, ZY ;
Ma, ZH ;
Wa, Y ;
Liu, GH .
COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, :331-331
[44]   Privacy-Preserving Mining of Association Rules on Distributed Databases [J].
Chang, Chin-Chen ;
Yeh, Jieh-Shan ;
Li, Yu-Chiang .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11) :259-266
[45]   A tree-based data perturbation approach for privacy-preserving data mining [J].
Li, Xiao-Bai ;
Sarkar, Sumit .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) :1278-1283
[46]   Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining [J].
Zhu, Dan ;
Li, Xiao-Bai ;
Wu, Shuning .
DECISION SUPPORT SYSTEMS, 2009, 48 (01) :133-140
[47]   A tree-based data perturbation approach for privacy-preserving data mining [J].
IEEE Computer Society ;
不详 ;
不详 .
IEEE Trans Knowl Data Eng, 2006, 9 (1278-1283) :1278-1283
[48]   Privacy-preserving distributed mining of association rules on horizontally partitioned data [J].
Kantarcioglu, M ;
Clifton, C .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (09) :1026-1037
[49]   A Survey on Privacy Preserving Data Mining [J].
Wang, Jian ;
Luo, Yongcheng ;
Zhao, Yan ;
Le, Jianjin .
FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, :111-114
[50]   An Overview of Privacy Preserving Data Mining [J].
Qi, Xinjun ;
Zong, Mingkui .
2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 :1341-1347