期刊文献+

隐私保护数据挖掘算法综述 被引量:16

A Survey of Privacy Preserving Data Mining Algorithms
在线阅读 下载PDF
导出
摘要 如何保护私有信息或敏感知识在挖掘过程中不被泄露,同时能得到较为准确的挖掘结果,目前已经成为数据挖掘研究中的一个很有意义的研究课题。本文通过对当前隐私保护数据挖掘中具有代表性的算法按照数据分布对其中的数据更改方法、数据挖掘算法、数据或规则隐藏等进行了详细阐述,并对各自的优缺点进行了分析和比较,总结出了各种算法的特性。此外,通过对比提出了隐私保护数据挖掘算法的评价标准,即保密性、规则效能、算法复杂性、扩展性,以便在今后的研究中提出新的有效算法。 There has been a meaningful research problem that how to protect privacy or sensitive information from leaking during data mining process, meanwhileobtain accurate result. This paper summarizes the features of privacy preserving data mining algorithms by analyzing and comparing some representative ones which include data distribution, data modification, data mining algorithms and data or rules hiding in the light of data distribution. Furthermore according to the comparison, some evaluation standards are brought forward to develop new effective algorithms for future research, such as secrecy, rules efficiency, complexity of the algorithm, expandability.
出处 《计算机科学》 CSCD 北大核心 2007年第6期183-186,199,共5页 Computer Science
基金 863项目资助(编号:2002AA414060) 2005年陕西省自然科学基金资助(编号:2005F05)。
关键词 数据挖掘 隐私保护算法 数据分布 Data mining, Privacy preserving algorithms, Data distribution
  • 相关文献

参考文献19

  • 1Cranor L F,Reagle J,Ackerman M S.Beyond concern:Understanding net users' attitudes about online privacy:[Technical Report TR 99.4.3.].AT&T Labs-Research,1999.http://www.ressearch.att.com/library/
  • 2Vaidya J,Clifton C.Privacy preserving association rule mining in vertically partitioned data.In:the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2002.639~644
  • 3Han Jiawei Kamber M.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 4Verykios V S,Bertino E,Nai Fovino I.State-of-the-art in PrivacypreservingData Mining,SIGMOD Record,2004,33 (1)
  • 5Oleveira S R M,Zaiane O R.Protecting Sensetive Knowledge by Data Sanitization.In:Proceedings of the Third IEEE International Conference on Data Mining,2003
  • 6Oliveria S R M,Zaiane O R.Privacy Preserving Frequent Itemset Mining.In:Workshop on Privacy,Security,and Data Mining at The 2002 IEEE International Conference on Data Mining (ICDM 02),Maebashi City,Japan,December 2002
  • 7Dasseni E,Verykios V S,Elmagarmid A K,et al.Hiding Association Rules by Using Confidence and Support.In:Procedings of the 4th Information Hiding Workshop,2001.369~383
  • 8Pinkas B.Cryptographic techniques for privacy-preserving data mining.SIGKDD Explorations,2002,4 (2)
  • 9Chang Li Wu,Moskowitz I S.Parsimonious downgrading and decisions trees applied to the inference problem.In:Proceedings of the 1998 New Security Paradigms Workshop,1998.82~89
  • 10Evfimievski A,Srikant R,Agrawal R,et al.Privacy preserving mining of association rules.In:Proc.of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and DataMining,ACM Press,2002.217~228

二级参考文献12

  • 1Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. htttp://theory.lcs.mit.edu/-oded
  • 2Cramer R. Introduction to secure computation. In: Damgaard I, ed. Lectures on Data Security-Modern Cryptology in Theory and Practice. Lecture Notes in Computer Science, Vol 1561. Springer-Verlag, 1999. 16-62.
  • 3Yao AC. Protocols for secure computation. In: Proc. of the 23rd IEEE Symp. on Foundation of Computer Science. Chicago: IEEE Computer Society, 1982. 160-164.
  • 4Cachin C. Efficient private bidding and auctions with an oblivious third party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery, 1999.120~127.
  • 5Fagin R, Naor M, Winkler P. Comparing information without leaking it. Communications of the ACM, 1996,39(5):77-85.
  • 6Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed., John Wiley & Sons, Inc., 1996.
  • 7Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Slern J, ed.Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vo1.1592, Springer-Verlag, 1999.402~414.
  • 8Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In: Association for Computing Machinery, ed. Proc.of the 5th ACM Conf. on Computer and Communications Security. San Francisco: ACM, 1998.59~66.
  • 9Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring. In: Nyberg K, ed. Proc. of the Advances in Cryptology-EUROCRYPT'98. Lecture Notes in Computer Science, Vol 1403, Springer-Verlag, 1998. 308~318.
  • 10Paillier P. Public-Key cryptosystem based on composite degree residuosity classes. In: Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vol 1592, Springer-Verlag, 1999. 223~238.

共引文献78

同被引文献111

引证文献16

二级引证文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部