Incentive-Compatible Privacy-preserving Distributed Data Mining

被引:2
|
作者
Kantarcioglu, Murat [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
D O I
10.1109/ICDMW.2013.67
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The quantity of data that is captured, collected, and stored by a wide variety of organizations is growing at an exponential rate. The potential for such data to support scientific discovery and optimization of existing systems is significant, but only if it can be integrated and analyzed in a meaningful way by a wide range of investigators. While many believe that data sharing is desirable, there are also privacy and security concerns, rooted in ethics and the law that often prevent many legitimate and noteworthy applications. In this talk, we will provide an overview on research regarding how to integrate and mine large amounts of privacy-sensitive distributed data without violating such constraints. Especially, we will discuss how to incentivize data sharing in privacy-preserving distributed data mining applications. This work will draw upon examples form the biomedical domain and discuss recent research on privacy-preserving mining of genomic databases.
引用
收藏
页码:859 / 859
页数:1
相关论文
共 50 条
  • [31] Improved score function on privacy-preserving distributed mining
    School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan 430073, China
    不详
    Wuhan Ligong Daxue Xuebao, 2008, 6 (140-142):
  • [32] An accurate privacy-preserving data mining algorithm for frequent itemsets in distributed databases
    Hu Xiaodan
    Wang Yongchu
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1289 - 1291
  • [33] Hierarchical infrastructure for large-scale distributed privacy-preserving data mining
    Wang, JL
    Xu, CF
    Shen, HF
    Pan, YH
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 1020 - 1023
  • [34] A high collusion-resistant approach to distributed privacy-preserving data mining
    Urabe, Shintaro
    Wang, Jiahong
    Kodama, Eiichiro
    Takata, Toyoo
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 326 - +
  • [35] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [36] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
  • [37] Privacy-Preserving Data Mining for Horizontally-Distributed Datasets Using EGADP
    Al-Ahmadi, Mohammad Saad
    INNOVATION AND KNOWLEDGE MANAGEMENT IN BUSINESS GLOBALIZATION: THEORY & PRACTICE, VOLS 1 AND 2, 2008, : 766 - 774
  • [38] Privacy-preserving data mining in electronic surveys
    Zhan, J
    Matwin, S
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185
  • [39] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [40] Privacy-preserving data mining in electronic surveys
    Zhan, Justin
    Matwin, Stan
    International Journal of Network Security, 2007, 4 (03) : 318 - 327