Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitization approach and Secure Multi-party Computation approach. This paper presents a Data modification– based Framework for classification and evaluation of the privacy preserving data mining techniques. Based on our framework the techniques are divided into two major groups, namely perturbation approach and anonymization approach. Also in proposed framework, eight functional criteria will be used to analyze and analogically assessment of the techniques in these two major groups. The proposed framework provides a good basis for more accurate comparison of the given techniques to privacy preserving data mining. In addition, this framework allows recognizing the overlapping amount for different approaches and identifying modern approaches in this field.
Authors and Affiliations
MohammadReza Keyvanpour , Somayyeh Seifi Moradi
An Efficient Adaptive Filtering for CFA Demosaicking
Most digital still cameras acquire imagery with a color filter array (CFA), ampling only one color value for each pixel and interpolating the other two color values afterwards. The nterpolation process is commonly known...
A Novel Algorithm for Scaling up the Accuracy of Decision Trees
Classification is one of the most efficient and widely used data mining technique. In classification, Decision trees can handle high dimensional data, and their representation is intuitive and generally easy to assimilat...
Investigation on Efficient Management of workflows in cloud computing Environment
Cloud computing is an on-demand service model often based on virtualization technique and this paper explores the use of cloud computing for scientific workflows, focusing on a widely used application. The approach is to...
An Evaluative Model for Information Retrieval System Evaluation: A Usercentered Approach
The key technology for knowledge management that guarantees access to large corpora of both structured and unstructured data is Information retrieval (IR) Systems. The ones commonly used on an everyday basis are search e...
Novel Pattern Matching Algorithm for Single Pattern Matching
Pattern matching is one of the important issues in the areas of network security and many others. The increase in network speed and traffic may cause the existing algorithms to become a performance bottleneck. Therefore,...