Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitization approach and Secure Multi-party Computation approach. This paper presents a Data modification– based Framework for classification and evaluation of the privacy preserving data mining techniques. Based on our framework the techniques are divided into two major groups, namely perturbation approach and anonymization approach. Also in proposed framework, eight functional criteria will be used to analyze and analogically assessment of the techniques in these two major groups. The proposed framework provides a good basis for more accurate comparison of the given techniques to privacy preserving data mining. In addition, this framework allows recognizing the overlapping amount for different approaches and identifying modern approaches in this field.
Authors and Affiliations
MohammadReza Keyvanpour , Somayyeh Seifi Moradi
ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers
The k-nearest neighbor (k-NN) is one of the most popular algorithms used for classification in various fields of pattern recognition & data mining problems. In k-nearest neighbor classification, the result of a new i...
Entropy Based Texture Features Useful for Automatic Script Identification
In a multi script environment, a collection of documents printed in different scripts is in practice. For automatic processing of such documents through Optical Character Recognition, it is necessary to identify the scri...
A Novel Biometric system for Person Recognition Using Palm vein Images
The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, we present a n...
A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs
Transmission of VoIP over packet switching networks is one of the rapidly emerging real-time Internet Protocol. The real-time application of the Voice over Internet Protocol (VoIP) is growing rapidly for it is more flexi...
A Novel Method for Brain MRI Super-resolution by Wavelet-based POCS and Adaptive Edge Zoom
This paper aims to make the super-resolution of a high-resolution image from a sequence of low-resolution frames containing non-stationary objects. The challenges of making super-resolution image, like unavoidable smooth...