期刊文献+

分布式隐私保护FHE-DBIRCH模型研究

Research on privacy preserving FHE-DBIRCH model
下载PDF
导出
摘要 隐私保护数据挖掘是当前数据挖掘领域中一个十分重要的研究问题,其目标是在无法获得原始明文数据时可以进行精确的数据挖掘,且挖掘的规则和知识与明文数据挖掘的结果相同或类似。为了强化数据的隐私保护、提高挖掘的准确度,针对分布式环境下聚类挖掘隐私保护问题,结合完全同态加密、解密算法,提出并实现了一种基于完全同态加密的分布式隐私保护FHE-DBIRCH模型。模型中数据集传输采用完全同态加密算法加密、解密,保证原始数据的隐私。理论分析和实验结果表明,FHE-DBIRCH模型不仅具有很好的数据隐私性且保持了聚类精度。 Privacy preserving is one of the most important topics in data mining. The purpose is to discover accurate rules and knowledge without precise access to the raw data. Its mining rules and knowledge are the same or similar with the plaintext data mining results. In order to enhance privacy preservation and improve data mining accuracy, the paper focuses on the privacy preserving problem of clustering data mining in a distributed environment, combines fully homomorphic encryption and decryp- tion algorithms, and proposes a fully homomorphic encryption algorithm based on the FHE-DBIRCH model. The model ensures data privacy when data transmission uses fully homomorphic encryption and decryption. Theoretical analysis and experimental results show that the FHE-DBIRCH model can provide better privacy and accuracy.
作者 刘英华
出处 《计算机工程与科学》 CSCD 北大核心 2014年第7期1384-1388,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61175048)
关键词 数据挖掘 隐私保护 聚类 分布式数据库 data mining privacy preserving clustering distributed database
  • 相关文献

参考文献10

  • 1周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:220
  • 2韩家炜 范明 孟小峰.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 3崇志宏,倪巍伟,刘腾腾,张勇.一种面向聚类的隐私保护数据发布方法[J].计算机研究与发展,2010,47(12):2083-2089. 被引量:13
  • 4Gentry C. Fully homomorphic encryption using ideal lattices [C]//Proc of the 41st Annual ACM Symposium on Theory of Computing (STOC'09), 2009:169-178.
  • 5Kamakshi P, Babu A V. Preserving privacy and sharing the data in distributed environment using cryptographic technique on perturbed data[J]. Journal of Computing, 2010, 2 (4) : 115-119.
  • 6Vaidya J, Clifton C W, Zhu Y M. Privacy preserving data mining[M]. Purdue:Springer, 2006.
  • 7Vaidya J, Clifton C. Privacy-preserving K-means clustering over vertically partitioned data[C]//Proc of the SIGKDD'03, 2003:24-27.
  • 8Kumar K A, Rangan C P. Privacy preserving DBSCAN algo- rithm for clustering [J]. Advanced Data Mining and Applica- tions, 2007, 4632:57-68.
  • 9Gentry C. Fully homomorphic encryption using ideal lattices [C] // Proc of Symposium on the Theory of Computing (STOC), 2009:169-178.
  • 10Halkidi M, Vazirgiannis M, Batistakis Y. Quality scheme assessment in the clustering process[C]//Proc of PKDD Conference, 2000 : 265-276.

二级参考文献84

共引文献273

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部