Title :
Study of Privacy Preserving Data Mining
Author_Institution :
East China Jiaotong Univ., Nachang, China
Abstract :
There has been an important research area that how to protect private information or sensitive knowledge from leaking in the mining process, meanwhile obtain more accurate results of data mining. This paper describes data distortion, data encryption and reconstruction techniques in detail. Following a comprehensive comparison and analysis of existing technologies, the future work is showed.
Keywords :
cryptography; data mining; data privacy; data distortion; data encryption; data reconstruction techniques; knowledge sensitivity; privacy preserving data mining; Association rules; Cryptography; Data mining; Data privacy; Data security; Informatics; Information security; Information technology; Protection; Transaction databases; Data Dining; Data Distortion; Data Encryption; Data Reconstruction; Privacy Preserving;
Conference_Titel :
Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on
Conference_Location :
Jinggangshan
Print_ISBN :
978-1-4244-6730-3
Electronic_ISBN :
978-1-4244-6743-3
DOI :
10.1109/IITSI.2010.14