nav emailalert searchbtn searchbox tablepage yinyongbenwen piczone journalimg journalInfo journalinfonormal searchdiv searchzone qikanlogo popupnotification paper paperNew
2020, 08, v.36;No.328 41-44+54
隐私保护数据挖掘技术研究综述
基金项目(Foundation): 北京市教育委员会社科计划一般项目(SQSM201714073001)
邮箱(Email):
DOI:
摘要:

随着云计算、物联网和社交媒体技术的快速发展,大数据挖掘和分析成为未来知识发现的重要手段,数据隐私泄露问题日趋严重,如何保护用户隐私和防止敏感信息泄露成为面临的最大挑战。由于大数据具有规模大、多样性、动态更新速度快等特点,许多传统的隐私保护技术不再适用。文章从知识发现的视角,总结了隐私保护数据挖掘的生命周期模型;从输入隐私和输出隐私方面对隐私保护数据挖掘的相关技术研究进行了分类评述;最后,对隐私保护数据挖掘的研究挑战和未来展望进行了阐述。

Abstract:

With the rapid development of cloud computing, Internet of Things and social media technologies, big data mining and analysis have become an important means of knowledge discovery in the future. The content of information with personal privacy is becoming more and more diverse, and the problem of data privacy leakage is becoming increasingly serious. How to protect user privacy and prevent sensitive information leakage has become the biggest challenge. Because of the large scale, diversity, and fast dynamic update of big data, many traditional privacy preserving technologies are no longer applicable. This article summarizes the life cycle model of privacy preserving data mining from the perspective of knowledge discovery. The related research on privacy preserving data mining is classified and reviewed in terms of input privacy and output privacy. The research challenges and future prospects of privacy preserving data mining are described.

参考文献

[1] 胡昌平,仇蓉蓉,王丽丽.学术社交网络用户的隐私保护研究——以科学网博客为例[J].情报学报,2019,38(7):667-674.

[2] 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258..

[3] 方贤进,肖亚飞,杨高明.大数据及其隐私保护[J].大数据,2017,3(5):45-56.

[4] Sangeetha S,Sadasivam G S.Privacy of Big Data:A Review [M].Handbook of Big Data and IoT Security.Springer,Cham.,2019:5-23.

[5] Kantarcioglu M.A survey of privacy-preserving methods across horizontally partitioned data [M].Privacy-preserving data mining.Springer,Boston,MA,2008:313-335.

[6] Pfitzmann A,K?hntopp M.Anonymity,unobservability,and pseudonymity—a proposal for terminology[C].Designing privacy enhancing technologies.Springer,Berlin,Heidelberg,2001:1-9.

[7] Sweeney L.k-anonymity:A model for protecting privacy [J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(05):557-570.

[8] Homayoun S,Ahmadzadeh M,Hashemi S,et al.BoTShark:A deep learning approach for botnet traffic detection [M].Cyber Threat Intelligence.Springer,Cham,2018:137-153.

[9] Agrawal D,Aggarwal C C.On the design and quantification of privacy preserving data mining algorithms[C].Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems.ACM,2001:247-255.

[10] Li N,Li T,Venkatasubramanian S.t-closeness:Privacy beyond k-anonymity and l-diversity[C].2007 IEEE 23rd International Conference on Data Engineering.IEEE,2007:106-115.

[11] Dwork C,McSherry F,Nissim K,et al.Calibrating noise to sensitivity in private data analysis[C].Theory of cryptography conference.Springer,Berlin,Heidelberg,2006:265-284.

[12] Dwork C.Differential privacy [J].Encyclopedia of Cryptography and Security,2011:338-340.

[13] 方滨兴,贾焰,李爱平,等.大数据隐私保护技术综述[J].大数据,2016,2(1):1-18.

[14] Privacy-preserving data mining:models and algorithms [M].Springer Science & Business Media,2008.

[15] 许重建,李险峰.区块链交易数据隐私保护方法[J].计算机科学,2020,47(3):281-286.

[16] Aggarwal Charu C,S Yu Philip.Privacy-preserving data mining:models and algorithms[M].Springer Science & Business Media,2008.

[17] Atallah M,Bertino E,Elmagarmid A,et al.Disclosure limitation of sensitive rules[C].Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99)(Cat.No.PR00453).IEEE,1999:45-52.

[18] Chang L W,Moskowitz I S.An integrated framework for database privacy protection [M].Data and Application Security.Springer,Boston,MA,2002:161-172.

[19] Tapan Sirole,Jaytrilok Choudhary,Tapan Sirole,et al.A Survey of Various Methodologies for Hiding Sensitive Association Rules [J].International Journal of Computer Applications,2014,51(96):12-15.

[20] Ateniese G,Burns R,Curtmola R,et al.Provable data possession at untrusted stores[C].Proceedings of the 14th ACM conference on Computer and communications security.Acm,2007:598-609.

[21] Juels A,Kaliski Jr B S.PORs:Proofs of retrievability for large files[C].Proceedings of the 14th ACM conference on Computer and communications security.Acm,2007:584-597.

[22] Ateniese G,Di Pietro R,Mancini L V,et al.Scalable and efficient provable data possession[C].Proceedings of the 4th international conference on Security and privacy in communication netowrks.ACM,2008:9.

[23] Wang Q,Wang C,Li J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C].European symposium on research in computer security.Springer,Berlin,Heidelberg,2009:355-370.

[24] Agrawal R,Srikant R.Privacy-preserving data mining[C].ACM Sigmod Record.ACM,2000,29(2):439-450.

[25] Ge W,Wang W,Li X,et al.A privacy-preserving classification mining algorithm[C].Pacific-Asia Conference on Knowledge Discovery and Data Mining.Springer,Berlin,Heidelberg,2005:256-261.

[26] Moskowitz L W,Chang I S.A decision theoretical based system for information downgrading[R].NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS (CHACS),2000.

[27] 贾春福,王雅飞,陈阳,等.机器学习算法在同态加密数据集上的应用[J].清华大学学报(自然科学版),2020,60(6):456-463.

[28] Oliveira S R M,Zaiane O R.Privacy preserving clustering by data transformation [J].Journal of Information and Data Management,2010,1(1):37-37.

[29] VAIDYA J,CLIFTON C.Privacy preserving k-means clustering over vertically partitioned data[C].Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,August 24-27,2003,Washington DC,USA.New York:ACM Press,2003:206-215.

基本信息:

中图分类号:TP309;TP311.13

引用信息:

[1]杨洋,陈红军.隐私保护数据挖掘技术研究综述[J].微型电脑应用,2020,36(08):41-44+54.

基金信息:

北京市教育委员会社科计划一般项目(SQSM201714073001)

发布时间:

2020-08-20

出版时间:

2020-08-20

检 索 高级检索

引用

GB/T 7714-2015 格式引文
MLA格式引文
APA格式引文