期刊文献+

分布式隐私保护数据挖掘研究 被引量:10

State-of-the-art in distributed privacy preserving data mining
下载PDF
导出
摘要 隐私保护挖掘是近年来数据挖掘领域的热点之一,主要研究在避免敏感数据泄露的同时在数据中挖掘出潜在的知识。实际应用中,大量的数据分别存放在多个站点,因此分布式隐私保护数据挖掘(distributed priva-cy preserving data mining,DPPDM)的研究更具有实际意义。对该领域的研究进行了详细的阐述,比较了各种方法的优缺点,对现有方法进行了分类和总结,最后指出了该领域未来的研究方向。 In recent years,privacy preserving data mining is one of the hot point problems in data mining.The chief research is how to mine the potential knowledge and not to reveal the sensitive data.In reality,large amounts of data stored in multiple sites,so the DPPDM(distributed privacy preserving data mining) is more important.This paper summarized the features of DPPDM,detailed described the research in this area,compared the advantages and disadvantages of each method,surveyed the state-of-the-art in DPPDM.Furthermore,it pointed out the future research directions.
出处 《计算机应用研究》 CSCD 北大核心 2011年第10期3606-3610,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60875029) 北京市科技计划专项课题
关键词 数据挖掘 隐私保护 分布式 data mining privacy preserving distributed data
  • 相关文献

参考文献3

二级参考文献41

  • 1CRANOR L F. Web privacy with P3P [M]. Sebastopol: O'Reilly, 2002:3 - 11.
  • 2O'HERRIN J K, FOST N, KUDSK K A. Health insurance portability accountability act (HIPAA) regulations: effect on medical record research [J]. Annals of Surgery, 2004, 239(6): 772.
  • 3CAN/CSA-Q830-96. Privacy code[S]. Canada: [s.n.] , 1997.
  • 4AGRAWAL R, SRIKANT R. Privacy-preserving data mining [J]. ACM Sigmod Record, 2000, 29(2): 439-450.
  • 5EVFIMIEVSKI A, SRIKANT R, AGRAWAL R, et al. Privacy preserving mining of association rules [J]. Information Systems, 2002, 29(4) :343 - 364.
  • 6FIENBERG S. E, MCINTYRE J. Data swapping: variations on a theme by Dalenius and Reiss [J3. Privacy in Statistical Databases, 2004, 3050: 14 - 29.
  • 7SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5) : 571 - 588.
  • 8CHAWLA S, DWORK C, MCSHERRY F, et al. Toward privacy in public databases [C]//The 2rid Theory of Cryptography Conference. Cambridge: Springer, 2005 :363 - 385.
  • 9YAO A C C. How to generate and exchange secrets [C]// Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Toronto: IEEE, 1986: 162 - 167.
  • 10BEAVER D, Foundations of secure interactive computing [C]// Advances in Cryptology. Santa Barbara: Springer, 1991:377 - 391.

共引文献55

同被引文献117

引证文献10

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部