期刊文献+

基于隐私保护的聚类研究

Research on clustering based on privacy preserving
下载PDF
导出
摘要 数据挖掘技术在发现规律和知识的同时也暴露了一些隐私信息,隐私保护因此成为数据挖掘过程中需要研究的重要问题,其目标是在不访问真实原始数据的条件下,能得到正确的数据挖掘结果。介绍聚类分析过程中的隐私保护问题,讨论了基于隐私保护的聚类分析基本思想。 Data mining technology plays the tremendous role also brings many security issues. Privacy preserving becomes a very important field of data mining research. The goal is to get a exact model and analysis result under the condition of visiting the real original data. It gives out the effective protection of information security to a great extent. This paper analyzes and introduces how to maintain privacy of clustering mining.
作者 姚瑶 吉根林
出处 《信息技术》 2008年第6期26-29,共4页 Information Technology
基金 江苏省自然科学基金(BK2005135)
关键词 聚类分析 隐私保护 数据挖掘 clustering analysis privacy preserving data mining
  • 相关文献

参考文献9

  • 1Stanley R M Oliveira, Osmar R Zaiane. Privacy Preserving Clustering By Data Transformation[ C ]//Proc. of the 18th Brazilian Symposium on Databases, Manaus, Brazil, 2003:304-318.
  • 2黄伟伟,柏文阳.聚类挖掘中隐私保护的几何数据转换方法[J].计算机应用研究,2006,23(6):180-181. 被引量:7
  • 3Stanley R M Oliveira, Osmar R Zaiane. Achieving Privacy Preservation When Sharing Data for Clustering[C]//Proc. of the International Workshop on Secure Data Management in a Connected World, 2004: 67 - 82.
  • 4Ali Inan, Yucel Saygin. Privacy Preserving Clustering on Horizontally Partitioned Data[C] .Proceedings of the 22nd International Conference on Data Engineering . Atlanta, GA: IEEE Press. 2006.
  • 5Jagannathan G, Wright R. Privacy-preserving distributed K-Means clustering over arbitrarily partitioned data [ C ]//proc. of the 11 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL:2005:593 - 599.
  • 6Vaidya J, Clifton C. Privacy-Preserving K-Means Clustering Over Vertically Partitioned Data[ C]//Proc. of the 9th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, Washington, DC, 2003:206 - 215.
  • 7Chris Clifton, Murat Kantarcioglu,Jaideep Vaidya, et al. Tools for Privacy Preserving Distributed Data Mining [ J ]. SIGKDD Exploration. 2002,4(2) :28 - 34.
  • 8Yao h C. Protocols for secure computations[C]//Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science[M]. Los Alamitos: IEEE Computer Society Press, 1982:160- 164.
  • 9Jiawei Han,Kamber M.数据挖掘:概念与技术[M].2版.范明,孟小峰,译.北京:机械工业出版社,2007:263.

二级参考文献7

  • 1李蒙,宋翰涛.数据挖掘中隐私保护的随机化处理方法[J].计算机工程与科学,2005,27(2):58-59. 被引量:6
  • 2蔡士杰.计算机图形学[M].北京:电子工业出版社,1998-04.56.
  • 3L Brankovic,V Estivill-Castro.Privacy Issues in Knowledge Disco-very and Data Mining[C].Melbourne,Victoria,Australia:Proc.of Australian Institute of Computer Ethics Conference,1999.
  • 4W Klsgen.Anonymization Techniques for Knowledge Discovery in Databases[C].Montreal,Canada:Proc.of the 1st International Conference on Know-ledge Discovery and Data Mining (KDD-95),1995.186-191.
  • 5M K Reiter,A D Rubin.Crowds:Anonymity for Web Transactions[J].The ACM Transactions on Information and System Security,1998,1(1):66-92.
  • 6P Samarati.Protecting Respondents' Identities in Microdata Release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027.
  • 7[EB/OL] http://www.cs.waikato.ac.nz/ml/weka/index.html.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部