Privacy-preserving data mining systems

被引:40
|
作者
Zhang, Nan [1 ]
Zhao, Wei
机构
[1] Univ Texas, Arlington, TX 76019 USA
[2] Rensselaer Polytech Inst, Sch Sci, Troy, NY 12181 USA
关键词
Data management; Data mining; Information sharing; Privacy;
D O I
10.1109/MC.2007.142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although successful in many applications, data mining poses special concerns for private data. An integrated architecture takes a systemic view of the problem, implementing established protocols for data collection, inference control, and information sharing.
引用
收藏
页码:52 / +
页数:8
相关论文
共 50 条
  • [31] Privacy-preserving data mining: Past, present, and future
    Ashrafi, Mafruz Zaman
    Taniar, David
    [J]. IEEE INTELLIGENT SYSTEMS, 2007, 22 (04) : 86 - 87
  • [32] DAG: A General Model for Privacy-Preserving Data Mining
    Teo, Sin G.
    Cao, Jianneng
    Lee, Vincent C. S.
    [J]. 2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 2018 - 2019
  • [33] Privacy-Preserving Data Mining in Presence of Covert Adversaries
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 429 - 440
  • [34] PrivPy: General and Scalable Privacy-Preserving Data Mining
    Li, Yi
    Xu, Wei
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 1299 - 1307
  • [35] Privacy-Preserving in the Context of Data Mining and Deep Learning
    Altalhi, Amjaad
    Al-Saedi, Maram
    Alsuwat, Hatim
    Alsuwat, Emad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06): : 137 - 142
  • [36] Privacy-preserving data mining: Why, how, and when
    Vaidya, J
    Clifton, C
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 19 - 27
  • [37] Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering
    Ouda, Mohamed
    Salem, Sameh
    Ali, Ihab
    Saad, El-Sayed
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (06) : 604 - 612
  • [38] Efficient Privacy-Preserving Data Mining in Malicious Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
  • [39] Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining
    Merani, Maria Luisa
    Croce, Daniele
    Tinnirello, Ilenia
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (06) : 1340 - 1352
  • [40] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414