Privacy during Data Mining

被引:0
|
作者
Kumari, Aruna [1 ]
Rao, K. Rajasekhara [2 ]
Suman, M. [1 ]
机构
[1] KL Univ, ECM Elect & Comp Engn, Guntur, Andhra Pradesh, India
[2] Prakash Engn Coll, Tuni, India
关键词
Distortion; accuracy; codebook; privacy;
D O I
10.1007/978-3-319-13731-5_64
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The large amounts of data stored in computer files are increasing at a very remarkable rate. It is analysed and evaluated that the amount of data in the world is increasing like water coming into the ocean. At the same time, the users or a person who operates these data are expecting more sophisticated Knowledge. The Languages like Structure Query Languages are not adequate to support this increasing demand for information. Data mining makes an effort to solve the problem. We proposed a new approach for maintaining privacy during mining the knowledge from the data stores. Our approach is based on vector quantization, it quantizes the data to its nearest neighbour values that uses two algorithms one LBG and Modified LBG in codebook generation process.
引用
收藏
页码:593 / 600
页数:8
相关论文
共 50 条
  • [1] Privacy in Data Mining
    Josep Domingo-Ferrer
    Vicenç Torra
    [J]. Data Mining and Knowledge Discovery, 2005, 11 : 117 - 119
  • [2] Privacy in data mining
    Domingo-Ferrer, J
    Torra, V
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2005, 11 (02) : 117 - 119
  • [3] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [4] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [5] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [6] Output Privacy in Data Mining
    Wang, Ting
    Liu, Ling
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2011, 36 (01):
  • [7] Privacy Protection in Data Mining
    Fu, Chunchang
    Zhang, Nan
    [J]. 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 2, 2010, : 92 - 93
  • [8] Data mining and privacy: An overview
    Clifton, CW
    Mulligan, DK
    Ramakrishnan, R
    [J]. PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, : 191 - 208
  • [9] Privacy in Data Mining: A Review
    Dutta, Sharmistha
    Gupta, Ankit Kumar
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 556 - 559
  • [10] Data Mining, the Internet, and privacy
    Broder, AJ
    [J]. WEB USAGE ANALYSIS AND USER PROFILING, 2000, 1836 : 56 - 73