期刊文献+

基于数据处理的数据挖掘隐私保护技术分析 被引量:10

Analysis of Data Mining Privacy Preserving Technology Based on Data Processing
下载PDF
导出
摘要 随着数据挖掘技术的发展与应用,如何在得到准确的挖掘结果的同时保护隐私信息不被泄露,已经成为必须解决的问题。基于数据处理的数据挖掘隐私保护是一种有效的途径,通过采用不同的数据处理技术,出现了基于数据匿名、数据变换、数据加密、数据清洗、数据阻塞等技术的隐私保护算法。文中对基于数据处理的数据挖掘隐私保护技术进行了总结,对各类算法的基本原理、特点进行了探讨。在对已有技术和算法深入对比分析的基础上,给出了数据挖掘隐私保护算法的评价标准。 As the development and application of data mining, it is a problem which must be resolved that how to protect privacy from leaking when obtaining accurate result. Data mining privacy preserving based on data processing should be an effective way to resolve the problem. Based on different data processing technologies, various privacy preserving algorithms, such as data anonymity, data distortion, data encryption, data purification and data obstructing, have been developed. In this paper, the technologies of data mining privacy preserving based on data processing are surveyed; the mechanisms and characteristics of various algorithms are discussed. Following a comprehensive comparison and analysis of the existing technologies as well as the algorithms, the criteria of evaluating data mining privacy preserving algorithms are given.
出处 《计算机技术与发展》 2011年第3期94-97,101,共5页 Computer Technology and Development
基金 国家重点基础研究发展计划(973计划)资助项目(2011CB302903) 江苏省高校自然科学基础研究项目(08KJB620002) 南京邮电大学校科研基金(NY207051)
关键词 数据挖掘 隐私保护 数据处理 data mining privacy preserving data processing
  • 相关文献

参考文献13

  • 1郭宇红,童云海,唐世渭,杨冬青.数据库中的知识隐藏[J].软件学报,2007,18(11):2782-2799. 被引量:14
  • 2Oliveim S R M.Zainne O R.Protecting aenusitive knowledge by data sanitization[C]//Proc.of the 3rd IEEE International Conference on Data Mining (ICDM'03).Melbourne:[s.n.].2003:613-616.
  • 3Oliveira S R M,Zaiane O R.Privacy preserving farequent itonmet mining[C]//Proc.of the IEEE international conference on Privacy,security and data mining.Msebashi:Australian Computer Society,2002:43-54.
  • 4许焕霞,邵良杉,褚丽丽.随机正交变换法在隐私保持关联规则挖掘中的应用[J].科技和产业,2010,10(1):75-79. 被引量:2
  • 5Agrwal R,Srikant R.Privacy-Preserving Data Mining[C]//In Proc.of the ACM SIGMOD Conference on Management of Data.Dallas,Texas:[s.n.],2000:439-450.
  • 6Oliveim S R M.ZaYane O R.Achieving Privacy Preservation When Sharing Data For Clustering[C]//In Prnc.of the Workshop on Secure Data Management in a Connected World (SDM'04) in conjunction with VLDB'2004.Toronto,Ontario,Canada:[s.n.],2004:67-82.
  • 7李学明,刘志军,秦东霞.隐私保护数据挖掘[J].计算机应用研究,2008,25(12):3550-3555. 被引量:6
  • 8Saygin Y.Verykias V S,Elmagarmid A.Privacy Preserving Association Rule Mining[C]//In Proc.of 12th RIDE.[s.l.]:[s.n.],2002:151-158.
  • 9吕品,陈年生,董武世.面向隐私保护的数据挖掘技术研究[J].计算机技术与发展,2006,16(7):147-149. 被引量:9
  • 10Brumen B,Welzer T.Protecting Medical Data for Analyses[C]//Proceedings of the 15th IEEE Symposium on Computer-based Medical Systems(CBMS 2002).[s.l.]:[s.n.].2002:102-107.

二级参考文献80

共引文献39

同被引文献68

引证文献10

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部