Categorization and Assessment of Approaches of PPDDM Based on Techniques of Privacy Preserving

سال انتشار: 1391
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,264

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICS11_262

تاریخ نمایه سازی: 14 مهر 1392

چکیده مقاله:

One of the fresh aspects in data mining study is to develop techniques relating to the obsessions of privacy preserving, particularly, relating to the fact that techniques of data mining could be able to create sound models when the precise information of data is inaccessible. As a result of this research, numbers of data mining techniques with respect to privacy preserving are introduced in this study. One of these techniques - suggested in this paper - are to utilize methods of cryptography in data mining with respect to privacy preserving in distributed databases. We assume that data are stored in some private participants, and these participants agree upon a specific sort of estimating of data mining where the private characteristic of arrivals is preserved, and only the result of data mining is to be revealed. Variety of techniques has already been introduced in this field. This paper is to analyze and assess techniques of privacy preserving, introducing a framework based on methods of cryptography in data mining with respect to the privacy preserving. Considering the prevailing application of data mining methods in distributed databases, the suggested classification can possibly be influential in opting for a proper approach.

نویسندگان

Saeedeh Ranjbaran

Department of Electronic, Computer and IT, Islamic Azad University, Qazvin Branch, Qazvin, Iran

Mohammad Reza Keyvanpour

Department of Computer Engineering, Alzahra University, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • _ W. J. Frawley, G. Piatetsky- Shapiro, and C. J. ...
  • E. Bertino, I. Fovino and . Provenza, "A Framework for ...
  • S. R. M. Oliveira and , R. Zaiane, "Towards Standardization ...
  • _ _ _ _ Data Mining: Approaches and Techniques", International ...
  • _ _ _ Springer-Verlag Berlin Heidelberg, ICCS 2007, Part II, ...
  • J. Lee Brickell, _، Pri vacy-Preserving Computation for Data Mining, ...
  • N. Zhang and W. Zhao, _ _ Va cy-Preserving Data ...
  • Z. Yang, S. Zhong and R. N. Wright, _ _ ...
  • S. V. Kaya, T. B. Pedersen, E, Savas and Y. ...
  • Zh. XU, "Analysis of Privacy Preserving Distributed Data Mining Protocols", ...
  • _ _ _ Mining", In Proceedings of UNECE/ Eurostat Work ...
  • M. Dworkin, _ -Reco mmendation for Block Cipher Modes of ...
  • K. Das, "Privacy Preserving Distributed Data Mining based on Multi-objective ...
  • _ _ _ _ _ Secret Sharing", Proceeding PAIS '08 ...
  • _ _ _ 547-1, DOI: 10.5772/563, Published: under CC BY-NC-SA ...
  • 1th Iranian Conference _ Intelligent Systens February 27th & 28th, ...
  • _ _ _ _ _ _ Security, _ (1): pp. ...
  • _ _ _ _ Management of Data (ACM SIGMOD), ACM ...
  • M. Mohan and , Laxmaiah, "Secure Mining of Association ...
  • C. Su and K. Sakurai, "Secure Computation Over Distributed Databases", ...
  • L. Xiong, S. Chitti and L. Liu "Mining Multiple Private ...
  • _ _ Applications Symposium, pp. 121-128, 2006 ...
  • N. Zhang, _ _ Va cy-Preserving Data Mining", Texas A&M ...
  • R. Agrawal, R. Srikant, ، _ vacy-preserving data mining", in ...
  • _ _ _ Theory of computing Publisher: ACM, pp. 20-31, ...
  • B. Pinkas, "Cryptographic Techniques for Pri V acy-Preserving Data ...
  • S. Laur, H. Lipmaa and T. Mielikainen, "Private Itemset Support ...
  • O. V yborn y, "Time, Data Mining and Security", Ph.D. ...
  • نمایش کامل مراجع