Secure Computation for Privacy Preserving Data Mining
نویسنده
چکیده
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information used to feedback, increase revenue, cuts costs, or all. A number of freeware and shareware data mining software resources are available for analyzing data. Data Mining allows users or organizations to analyze the extracted data from many different dimensions or angles, systematically categorize it, and summarize the relationships identified. Privacy preserving data mining means the "mining" of knowledge from distributed data without disrupt the privacy of the parties involved in contributing the data. Data mining causes the social and ethical problem by acknowledge the data requiring privacy. Providing security to sensitive data against unauthorized access has been a long term goal for the database security research community and for the government statistical agencies. Hence, the security and privacy are the issues which become much more important area of research in data mining recently. KeywordsData Mining, Privacy, Security, data. __________________________________________________*****_________________________________________________
منابع مشابه
A Method for Privacy Preserving Data Mining in Secure Multiparty Computation using Hadamard Matrix
Secure multiparty computation allows multiple parties to participate in a computation. SMC (secure multiparty computation) assumes n parties where n>1. All the parties jointly compute a function. Privacy preserving data mining has become an emerging field in the secure multiparty computation. Privacy preserving data mining preserves the privacy of individual's data. Privacy preserving data mini...
متن کاملSecure Multiparty Computation for Privacy-Preserving Data Mining
In this paper, we survey the basic paradigms and notions of secure multiparty computation and discuss their relevance to the field of privacy-preserving data mining. In addition to reviewing definitions and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing highly efficient protocols. We also present comm...
متن کاملPrivacy-Preserving Distributed Data Mining Techniques: A Survey
In various distributed data mining settings, leakage of the real data is not adequate because of privacy issues. To overcome this problem, numerous privacy-preserving distributed data mining practices have been suggested such as protect privacy of their data by perturbing it with a randomization algorithm and using cryptographic techniques. In this paper, we review and provide extensive survey ...
متن کاملDistributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data
Recent concerns about privacy issues have motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. One approach to develop privacy preserving data mining algorithms is secure multiparty computation, which allows for privacy preserving data mining algorithms that do not trade accuracy for privacy. However, earlier methods suffer...
متن کاملEffective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing
Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or publishing models for privacy protection through privacy preserving data mining techniques (PP...
متن کاملClassification Rule Mining through SMC for Preserving Privacy Data Mining: A Review
Data Mining and Knowledge Discovery in Databases are two new dimensions of database technology that investigate the automatic extraction for identifying hidden patterns and trends from large amount of data. Several researchers have contributed variety of algorithms for generating the classification rule by considering different cases like scalability, computation time, I/O complexity, missing a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009