Privacy during Data Mining

被引:0
|
作者
Kumari, Aruna [1 ]
Rao, K. Rajasekhara [2 ]
Suman, M. [1 ]
机构
[1] KL Univ, ECM Elect & Comp Engn, Guntur, Andhra Pradesh, India
[2] Prakash Engn Coll, Tuni, India
关键词
Distortion; accuracy; codebook; privacy;
D O I
10.1007/978-3-319-13731-5_64
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The large amounts of data stored in computer files are increasing at a very remarkable rate. It is analysed and evaluated that the amount of data in the world is increasing like water coming into the ocean. At the same time, the users or a person who operates these data are expecting more sophisticated Knowledge. The Languages like Structure Query Languages are not adequate to support this increasing demand for information. Data mining makes an effort to solve the problem. We proposed a new approach for maintaining privacy during mining the knowledge from the data stores. Our approach is based on vector quantization, it quantizes the data to its nearest neighbour values that uses two algorithms one LBG and Modified LBG in codebook generation process.
引用
收藏
页码:593 / 600
页数:8
相关论文
共 50 条
  • [21] An Anonymization Service for Privacy in Data Mining
    Silveira, Matheus M.
    Silva, Danielle S.
    Souza, Michael S.
    Silva, Douglas A.
    Neto, Jonas N.
    Mesquita, Maria C.
    Gomes, Rafael L.
    PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023, 2023, : 214 - 219
  • [22] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [23] Study of Privacy Preserving Data Mining
    Li, Haisheng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
  • [24] Medical privacy versus data mining
    Farkas, C
    Valtorta, M
    Fenner, S
    WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVII, PROCEEDINGS: CYBERNETICS AND INFORMATICS: CONCEPTS AND APPLICATIONS (PT II), 2001, : 194 - 199
  • [25] A Survey on Privacy Preserving Data Mining
    Saranya, K.
    Premalatha, K.
    Rajasekar, S. S.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1740 - U2102
  • [26] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [27] On privacy in time series data mining
    Zhu, Ye
    Fu, Yongjian
    Fu, Huirong
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2008, 5012 : 479 - +
  • [28] Informational privacy, data mining, and the Internet
    Tavani H.T.
    Ethics and Information Technology, 1999, 1 (2) : 137 - 145
  • [29] Informational privacy, data mining, and the Internet
    Tavani, Herman T.
    Ethics and Information Technology, 1999, 1 (02): : 137 - 145
  • [30] Survey on privacy preserving data mining
    Wang P.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (09) : 1 - 7