期刊文献+

随机投影技术数据挖掘隐私的保护方法

Research on Protection Method of Privacy Random Projection Based on Data Mining Technology
下载PDF
导出
摘要 为确保隐私保护数据挖掘中所存在的维数灾难问题得到有效解决,文章提出了将基于随机投影技术的一种数据挖掘隐私保护法。这种方法对攻击者能够以随机投影矩阵推测的方式重建原始数据进行了综合考虑,首先将安全子空空间概念提出来,再构建安全子空间映射,在低失真嵌入实现的同时,能够有效确保数据安全。通过实验证明,在对数据隐私予以保护的前提下,这种方法为数据质量提供有效保障。 In order to ensure the privacy of data mining in the presence of the curse of dimensionality issues are effectively addressed,this article will dig Privacy Protection Act proposed is based on a random data projection technology.In this way the attacker can be presumed in a random manner as the projection matrix to reconstruct the original data were taken into account,first,the proposed concept of the security sub-blank space,and then build the security sub-space mapping,while embedded achieve low distortion,it is possible to ensure an effective data security.Through experiments proved to be protected under the premise of data privacy,this method provides effective protection for data quality.
作者 黄取治
出处 《安顺学院学报》 2015年第1期129-130,共2页 Journal of Anshun University
关键词 数据挖掘 随机投影技术 隐私保护 data mining stochastic projection technology privacy protection
  • 相关文献

参考文献2

二级参考文献42

  • 1罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护私有信息的布尔关联规则挖掘算法[J].电子学报,2005,33(5):900-903. 被引量:33
  • 2黄毅群,卢正鼎,胡和平,李瑞轩.分布式异常检测中隐私保持问题研究[J].电子学报,2006,34(5):796-799. 被引量:7
  • 3张锋,常会友.基于分布式数据的隐私保持协同过滤推荐研究[J].计算机学报,2006,29(8):1487-1495. 被引量:17
  • 4J Vaidya, C Clifton, M Zhu. Privacy Preserving Data Mining (Advances in Information Security) [M]. Springer-Verlag New York Inc, Nov. 2005.
  • 5V S Verykios, E Bertino, et al. State-of-the-art in privacy preserving data mining [J]. SIGMOD Record, 2004,33 ( 1 ) : 55 - 57.
  • 6Y Linden, B Pinkas. Privacy preserving data mining[ A ]. In: Advances in Cryptology-CRYPTO 2000, Proceedings of the 20th Annual International Cryptology Conference, LNCS 1880 [C] .2000.36- 54.
  • 7M Kantarcioglu, C Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data [ J ]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(9) : 1026 - 1037.
  • 8R Agrawal,R Srikant. Privacy-preserving data mining[ A ]. In: Proceedings of the 2000 ACM SIGMOD Conference on Management of Data[ C], 2000.439 - 450.
  • 9C Clifton, M Kantarcioglu, et al. Tools for privacy preserving distributed data mining[J]. ACM SIGKDD Explorations, 2003,4(2):28 -34.
  • 10Du Wen-fiang.A Study of Several Specific Secure Two-party Computation Problems [D ]. PhD thesis, Purdue University, West Lafayette, Indiana, 2001.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部