期刊文献+

基于概率论的隐私保持分类挖掘

Privacy-preserving Classification Mining Based on Probability Theory
在线阅读 下载PDF
导出
摘要 在现有的基于数据扰动的隐私保持分类挖掘算法中,扰动数据和原始数据相关联,对隐私数据的保护并不完善,且扰动算法和分类算法耦合度高,不适合在实际中使用。为此,提出一种基于概率论的隐私保持分类挖掘算法。扰动后可得到一组与原始数据独立同分布的数据,使扰动数据和原始数据不再相互关联,各种分类算法也可直接应用于扰动后的数据。 In the existed privacy-preserving classification mining methods based on data perturbation, the privacy data is not protected perfectly because the perturbed data and the original data have been related. The classification algorithm and the data perturbation algorithm have high coupling It is not easy to use these methods in practice. To solve these problems, it proposes a privacy-preserving classification mining algorithm based on probability theory. The perturbed data is independent from the original data and they have the same distribution. This proposed method overcomes the shortcomings of others. The perturbed data is no relation with the original data and the classification methods can be used on the perturbed data directly.
出处 《计算机工程》 CAS CSCD 2012年第3期12-13,18,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2007AA02Z329)
关键词 数据挖掘 隐私保持 数据扰动 随机噪声 决策树 data mining privacy protection data perturbation random noise decision tree
  • 相关文献

参考文献6

  • 1Agrawal R, Srikant R. Privacy-preserving Data Mining[J]. ACM SIGMOD Record, 2000, 29(2): 439-450.
  • 2Du Wenliang, Zhan Zhijun. Using Randomized Response Tech- niques for Privacy-preserving Data Mining[C] //Proceedings of the 9th ACM International Conference on Knowledge Discovery and Data Mining. Washington D. C., USA: [s. n.] , 2003: 505-510.
  • 3Agrawal D, Aggarwal C C. On the Design and Quantification of Privacy Preserving Data Mining Algorithms[C] //Proceedings of the 12th ACM Symposium on Principles of Database Systems. Santa Barbara, USA: [s. n.] , 2001: 247-255.
  • 4葛伟平,汪卫,周皓峰,施伯乐.基于隐私保护的分类挖掘[J].计算机研究与发展,2006,43(1):39-45. 被引量:20
  • 5隗晨雪,朱建明.基于隐私保护的朴素贝叶斯分类协议[J].计算机工程,2010,36(18):26-28. 被引量:3
  • 6Huang Zhengli, Du Wenliang, Chen Biao. Deriving Private Infor- mation from Randomized Data[C] //Proceedings of ACM’s Special Interest Group on Management of Data. Baltimore, Maryland, USA: [s. n.] , 2005: 37-48.

二级参考文献17

  • 1谢建全.一种实用的密钥共享方法[J].微型电脑应用,2005,21(6):40-41. 被引量:1
  • 2Rakesh Agrawal.Data mining:Crossing the chasm.The 5th Int'l Conf.Knowledge Discovery in Databases and Data Mining,San Diego,California,1999.
  • 3Rakesh Agrawal,Ramakrishnan Srikant.Privacy-preserving data mining.The ACM SIGMOD Conf.Management of Data,Dallas,Texas,2000.
  • 4Yehuda Lindell,Benny Pinkas.Privacy preserving data mining.In:Advances in Cryptology-Crypto.Berlin:Springer-Verlag,2000.36~ 54.
  • 5Dakshi Agrawal,Charu C.Aggarwal.On the design and quantification of privacy preserving data mining algorithms.The 20th Symposium on Principles of Database Systems,Santa Barbara,California,2001.
  • 6Wenliang Du,Zhijun Zhan.Using randomized response techniques for privacy-preserving data mining.The 9th ACM SIGKDD Int'l Conf.Knowledge Discovery in Databases and Data Mining,Washington,D.C.,2003.
  • 7L.F.Cranor,J.Reagle,M.S.Ackerman.Beyond concern:Understanding net users' attitudes about online privacy.AT&T Labs-Research,Tech.Rep.,1999.http://www.research.att.com/library/trs/TRs/99/99.4.3/report.htm.
  • 8J.R.Quinlan.C4.5:Programs for Machine Learning.San Mateo,CA:Morgan Kaufmann,1993.
  • 9Rakesh Agrawal,Sakti Ghost,Tomasz Imielinski,et al.An interval classifier for database mining applications.In:Proc.VLDB Conf.,Vancouver,British Columbia,Canada,1992.
  • 10L.Breiman,J.H.Friedman,R.A.Olshen,et al.Classification and Regression Trees.Boca Raton,Florida:CRC Press,1984.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部