Aggarwal et al., 2008 - Google Patents
Privacy-preserving data mining: a surveyAggarwal et al., 2008
- Document ID
- 5336003687918298952
- Author
- Aggarwal C
- Yu P
- Publication year
- Publication venue
- Handbook of Database Security: Applications and Trends
External Links
Snippet
In recent years, privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. A number of algorithmic techniques have been designed for privacy-preserving data mining. In this paper, we …
- 238000007418 data mining 0 title abstract description 72
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Aggarwal et al. | A general survey of privacy-preserving data mining models and algorithms | |
| Aggarwal et al. | Privacy-preserving data mining: models and algorithms | |
| Fung et al. | Privacy-preserving data publishing: A survey of recent developments | |
| Ren et al. | $\textsf {LoPub} $: high-dimensional crowdsourced data publication with local differential privacy | |
| Malik et al. | Privacy preserving data mining techniques: current scenario and future prospects | |
| Goryczka et al. | $ m $-Privacy for Collaborative Data Publishing | |
| Navarro-Arribas et al. | Information fusion in data privacy: A survey | |
| Aggarwal et al. | Privacy-preserving data mining: a survey | |
| Su et al. | Privacy-preserving distributed data fusion based on attribute protection | |
| Askari et al. | An information theoretic privacy and utility measure for data sanitization mechanisms | |
| Dagher et al. | SecDM: privacy-preserving data outsourcing framework with differential privacy | |
| Zhao et al. | VertiMRF: Differentially Private Vertical Federated Data Synthesis | |
| Aggarwal | Privacy-preserving data mining | |
| Borisov et al. | Application of computer simulation to the anonymization of personal data: state-of-the-art and key points | |
| Venkatasubramanian | Measures of anonymity | |
| Kan | Seeking the ideal privacy protection: strengths and limitations of differential privacy | |
| Arumugam et al. | IMR based anonymization for privacy preservation in data mining | |
| Parmar et al. | A review on data anonymization in privacy preserving data mining | |
| Monreale et al. | Privacy-preserving outsourcing of data mining | |
| Gunawan et al. | $\ell\rho $-suppression: A Privacy Preserving Data Anonymization Method for Customer Transaction Data Publishing | |
| Zhang et al. | A (k, p)-anonymity framework to sanitize transactional database with personalized sensitivity | |
| Nissim | Private Data Analysis via Output Perturbation: A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms | |
| Li et al. | M-generalization for multipurpose transactional data publication | |
| Gkoulalas-Divanis et al. | Privacy issues in association rule mining | |
| Oliveira | Data transformation for privacy-preserving data mining |