Privacy Preserving Data Mining for Deliberative Consultations

被引:0
|
作者
Andruszkiewicz, Piotr [1 ]
机构
[1] Warsaw Univ Technol, Inst Comp Sci, Warsaw, Poland
来源
关键词
Privacy preserving data mining; Deliberative consultations; Reconstruction-based technique; Cryptography-based technique; Heuristic-based technique;
D O I
10.1007/978-3-319-32034-2_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In deliberative consultations, which utilise electronic surveys as a tool to obtain information from residents, preserving privacy plays an important role. In this paper investigation of a possibility of privacy preserving data mining techniques application in deliberative consultations has been conducted. Three main privacy preserving techniques; namely, heuristic-based, reconstruction-based, and cryptography-based have been analysed and a setup for online surveys performed within deliberative consultations has been proposed. This work can be useful for designers and administrators in the assessment of the privacy risks they face with a system for deliberative consultations. It can also be used in the process of privacy preserving incorporation in such a system in order to help minimise privacy risks to users.
引用
收藏
页码:102 / 113
页数:12
相关论文
共 50 条
  • [1] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [2] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [3] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [4] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [5] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [6] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [7] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [8] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [9] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [10] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347