Using cryptography for privacy protection in data mining systems

被引:0
|
作者
Zhan, Justin [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To conduct data mining including mining on the web data, we often need to collect data from various parties. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy presents a challenge. In this paper, we present a solution for privacy-preserving k-Medoids clustering which is one of data mining tasks. The solution is based on the cryptography technology.
引用
收藏
页码:494 / +
页数:4
相关论文
共 50 条
  • [31] Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
    Zhu, Dan
    Li, Xiao-Bai
    Wu, Shuning
    DECISION SUPPORT SYSTEMS, 2009, 48 (01) : 133 - 140
  • [32] Correction to: Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining
    D. Dhinakaran
    P. M. Joe Prathap
    The Journal of Supercomputing, 2022, 78 : 19754 - 19754
  • [33] Privacy Protection in Biometric-Based Recognition Systems [A marriage between cryptography and signal processing]
    Barni, Mauro
    Droandi, Giulia
    Lazzeretti, Riccardo
    IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) : 66 - 76
  • [34] Data Protection and Privacy: Data Protection and Democracy
    Bougiakiotis, Emmanouil
    MODERN LAW REVIEW, 2022, 85 (02): : 566 - 570
  • [35] Data Protection and Privacy: Data Protection and Democracy
    Bougiakiotis, Emmanouil
    MODERN LAW REVIEW, 2021,
  • [36] Ensuring Privacy in Data Mining using Neural Networks
    Niranjan, D.
    Manikandan, G.
    Sairam, N.
    Harish, V.
    Saikumar, Nooka
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 1262 - 1267
  • [37] Individual privacy in data mining using fuzzy optimization
    Bhuyan, Hemanta Kumar
    Kamila, Narendra Kumar
    Pani, Subhendu Kumar
    ENGINEERING OPTIMIZATION, 2022, 54 (08) : 1305 - 1323
  • [38] Privacy Preserving Mining of Distributed Data Using Steganography
    Kumari, D. Aruna
    Rao, K. Raja Sekhar
    Suman, M.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 263 - 269
  • [39] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [40] Privacy Preserving Data Mining within Anonymous Credential Systems
    Kiayias, Aggelos
    Xu, Shouhuai
    Yung, Moti
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 57 - +