期刊文献+

基于大数据的分布式隐私保护聚类挖掘算法研究 被引量:7

Research on distributed privacy protection clustering mining algorithm based on big data
下载PDF
导出
摘要 随着云计算和移动互联网技术的迅猛发展,网络上每时每刻都产生海量的数据,在大数据时代,数据大多采用分布式存储,存储在多个相互独立的站点上,典型的数据挖掘算法已不适应大数据背景下数据挖掘的相关隐私数据安全方面的需求。在大数据背景下,进行分布式数据挖掘,面临着要解决数据安全保护和隐私泄露等方面的技术问题。因此,本文将同态加密技术应用于典型的K-means聚类挖掘算法,设计一种基于大数据的分布式隐私保护的PP-kmeans算法,实验表明,该算法可以实现数据隐私安全保护,并且达到较为精确的大数据聚类挖掘效果。 With the rapid development of cloud computing and mobile Internet technology, huge amounts of data are generated onthe network at every moment. In the era of big data, most of the data are designed in distributed storage, stored on manyindependent sites. The typical data mining algorithm can not meet the requirement of privacy data security in the big databackground. In the big data background, distributed data mining is faced with the need to solve data security, privacy disclosure andother technical problems. Therefore, this paper applies homomorphic encryption technology to typical K-means clustering miningalgorithm, and designs a distributed privacy protection PP - kmeans algorithm based on big data. Experiments show that thisalgorithm can realize data privacy security protection. And more accurate big data clustering mining effect is achieved.
作者 左国才 ZUO Guocai(School of Software and Information Engineering,Hunan Vocational Institute of Software,Xiangtan Hunan 411100,China)
出处 《智能计算机与应用》 2018年第6期57-60,共4页 Intelligent Computer and Applications
基金 湘潭市2017年度市级科技指导性计划项目(ZJ20171018) 湖南省普通高校青年骨干教师培养对象资助项目(湘教办通[2014]186号)
关键词 大数据 数据挖掘 隐私保护 big data data mining privacy protection
  • 相关文献

参考文献3

二级参考文献35

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2O'LEARY D E. Knowledge discovery as a threat to database security knowledge discovery in databases [ M ]. Menlopark, CA : AAAI/MIT Press, 1991:508- 516.
  • 3EvFIMIEVSKI A, GEHRKE J, SRIKANT R. Limiting privacy breaches in privacy preserving data mining[ C ]//Proe of ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems. 2003 : 211 - 222.
  • 4ATALLAH M J, BERTINO E, AHMED K, et al. Disclosure limitation of sensitive rules[ C]//Proc of Workshop on Knowledge and Data Engineering Exchange. Chicago: IEEE Computer Society, 1999 : 45- 52.
  • 5OLIVEIRA S R M, ZAIANE O R. Algorithms for balancing privacy and knowledge discovery in association rule mining[ C]//Proc of Database Engineering and Application Symposium. 2003 : 54- 65.
  • 6SAYGIN Y, VERYKIOS V S, ELMAGARMID A K. Privacy preserving association rules mining: research issues in data engineering [ C ]//Proc of Engineering E-Commerce/E-Bussiness Systems. Paris : Jaideep Vaidya Chris Clifton ,2002 : 151 - 158.
  • 7AGRAWAL R, SRIKANT R. Privacy-preserving data mining[ C ]// Proc of ACM SIGMOD Record. New York: ACM Press, 2000: 439- 450.
  • 8陈肇.序列样式探勘的隐私权保护[D].中国台湾:静宜大学,2006.
  • 9OLIVEIRA S R M, ZAFANE R. Protecting sensitive knowledge by data sanitization[ C ]//Proc of IEEE International Conference on Data Mining. Melbourne: IEEE Computer Society, 2003 : 613- 616.
  • 10X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)

共引文献788

同被引文献45

引证文献7

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部