Using cryptography for privacy protection in data mining systems

被引:0
|
作者
Zhan, Justin [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To conduct data mining including mining on the web data, we often need to collect data from various parties. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy presents a challenge. In this paper, we present a solution for privacy-preserving k-Medoids clustering which is one of data mining tasks. The solution is based on the cryptography technology.
引用
收藏
页码:494 / +
页数:4
相关论文
共 50 条
  • [1] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
    Murugeshwari, B.
    Selvaraj, D.
    Sudharson, K.
    Radhika, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 839 - 851
  • [2] Towards efficient cryptography for privacy preserving data mining in distributed systems
    Magkos, Emmanouil
    Chrissikopoulos, Vassilis
    WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2008, : 301 - 304
  • [3] Privacy Preserving Data Mining using Image Slicing and Visual Cryptography
    Sah, Hare Ram
    Gunasekaran, G.
    2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 256 - 262
  • [4] Privacy Protection in Data Mining
    Fu, Chunchang
    Zhang, Nan
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 2, 2010, : 92 - 93
  • [5] Protection or privacy? Data mining and personal data
    Hand, DJ
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 1 - 10
  • [6] Privacy Protection Using Sensitive Data Protection Algorithm In Frequent Itemset Mining Of Medical Datasets
    Dheepa, R.
    Nandini, D. Usha
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 308 - 316
  • [7] Privacy protection in data mining: A perturbation approach for categorical data
    Li, Xiao-Bai
    Sarkar, Sumit
    INFORMATION SYSTEMS RESEARCH, 2006, 17 (03) : 254 - 270
  • [8] Hashing on strings, cryptography, and protection of privacy
    Rabin, MO
    COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, : 1 - 1
  • [9] Designing of Privacy Protection Platform Based on Data Mining
    Zhou Bing
    Zeng Zhihua
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 1251 - 1254
  • [10] A privacy data protection algorithm for mining association rules
    Zhu, Yuquan
    Sun, Chao
    Chen, Geng
    Journal of Computational Information Systems, 2010, 6 (10): : 3345 - 3352