计算机技术﹑电信技术 |
|
|
|
|
分布式数据挖掘中基于扰乱的隐私保护方法 |
马进, 李锋, 李建华 |
(上海交通大学 电子工程系,上海 200030) |
|
Perturbation method for distributed privacy-preserving data mining |
MA Jin, LI Feng, LI Jian-hua |
(Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030, China) |
[1] CRANOR L F. Web privacy with P3P [M]. Sebastopol: O’Reilly, 2002: 311.
[2] O′HERRIN J K, FOST N, KUDSK K A. Health insurance portability accountability act (HIPAA) regulations: effect on medical record research [J]. Annals of Surgery, 2004, 239(6): 772.
[3] CAN/CSA-Q830-96. Privacy code[S]. Canada: [s. n.], 1997.
[4] AGRAWAL R, SRIKANT R. Privacy-preserving data mining [J]. ACM Sigmod Record, 2000, 29(2): 439450.
[5] EVFIMIEVSKI A, SRIKANT R, AGRAWAL R, et al. Privacy preserving mining of association rules [J]. Information Systems, 2002, 29(4): 343364.
[6] FIENBERG S. E, MCINTYRE J. Data swapping: variations on a theme by Dalenius and Reiss [J]. Privacy in Statistical Databases, 2004, 3050: 1429.
[7] SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5): 571588.
[8] CHAWLA S, DWORK C, MCSHERRY F, et al. Toward privacy in public databases [C]//The 2nd Theory of Cryptography Conference. Cambridge: Springer, 2005: 363385.
[9] YAO A C C. How to generate and exchange secrets [C]//Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Toronto: IEEE, 1986: 162167.
[10] BEAVER D, Foundations of secure interactive computing [C]// Advances in Cryptology. Santa Barbara: Springer, 1991: 377391.
[11] CRAMER R, DAMGARD I, NIELSEN J B. Multiparty computation from threshold homomorphic encryption [J]. Advances in Cryptology:EUROCRYPT 2001, 2001, 2045: 280300.
[12] ZHONG S. Privacy-preserving algorithms for distributed mining of frequent itemsets [J]. Information Sciences, 2007, 177(2): 490503.
[13] DATTA S, BHADURI K, GIANNELLA C. Distributed data mining in peer-to-peer networks [J]. IEEE Internet Computing, 2006, 10(4): 18.
[14] INAN A, KAYA S V, SAYGIN J. Privacy preserving clustering on horizontally partitioned data[J]. Data and Knowledge Engineering, 2007, 63(3): 646666.
[15] KARGUPTA H, DAS K, LIU K. Multi-party, privacy-preserving distributed data mining using a game theoretic framework [J]. Lecture Notes in Computer Science, 2007, 4702: 523531.
[16] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes [J]. Lecture Notes in Computer Science, 1999, 1592: 223238.
[17] LI Z, WANG W, CHEN W. An anti-collusion solution for privacy-preserving data mining [C]//International Conference on Communication Technology. Guilin: [s. n.], 2006: 15. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|