[1]汤琳 何丰.隐私保护的数据挖掘方法的研究[J].计算机技术与发展,2011,(04):156-159.
 TANG Lin,HE Feng.Research on Privacy-Preserving Data Mining Method[J].,2011,(04):156-159.
点击复制

隐私保护的数据挖掘方法的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年04期
页码:
156-159
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Privacy-Preserving Data Mining Method
文章编号:
1673-629X(2011)04-0156-04
作者:
汤琳 何丰
北方民族大学计算机科学与工程学院
Author(s):
TANG LinHE Feng
School of Computer Science and Engineering,North University for Ethnics
关键词:
隐私保护数据挖掘隐私保护的关联规则挖掘分类挖掘聚类挖掘集中式数据分布式数据
Keywords:
privacy-preserving data mining privacy-preserving association rule mining privacy-preserving classification mining cluster mining centralized data distributed data
分类号:
TP301.6
文献标志码:
A
摘要:
介绍了隐私保护数据挖掘方法的产生背景和意义,其次概括了现阶段国内外隐私保护数据挖掘算法的研究现状,并对当前隐私保护数据挖掘领域中已提出的算法按照数据挖掘的方法、数据源分布情况、隐私保护技术和隐私保护对象以及数据挖掘应用类型等方面进行分类,然后分别详细阐述了在集中式和分布式数据分布环境下,应用在隐私保护的关联规则挖掘、分类和聚类挖掘中的一些典型的技术和算法,总结出它们的优缺点,并对这些优缺点进行剖析和对比,最后指明了隐私保护数据挖掘算法在未来的整体发展方向
Abstract:
Introduce the background and the significance of the privacy-preserving data mining methods.Secondly,summarized the present research status of the privacy-preserving data mining algorithm at home and abroad,and these algorithms in this area has been proposed already are classified according to the data mining methods,original data distribution,privacy-preserving techniques,privacy protection and data mining application type.Thirdly,it elaborates some typical technologies and algorithms which are used to the type such as the privacy-preserving association rule mining,and the privacy-preserving classification mining,and also the privacy-preserving cluster mining on the environment of the centralized data and the distributed data respectively.Most importantly,it also summarizes their advantages and disadvantages and then analyses and contrasts them to highlight the future direction

备注/Memo

备注/Memo:
国家自然科学基金(61070131)汤琳(1985-),女,河南新野人,硕士研究生,研究方向为数据挖掘;何丰,教授,从事语义web和数据挖掘的研究
更新日期/Last Update: 1900-01-01