scispace - formally typeset
Book ChapterDOI

A General Survey of Privacy-Preserving Data Mining Models and Algorithms

TLDR
This paper provides a review of the state-of-the-art methods for privacy, including methods for randomization, k-anonymization, and distributed privacy-preserving data mining, and the computational and theoretical limits associated with privacy- Preserving over high dimensional data sets.
Abstract
In recent years, privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. A number of algorithmic techniques have been designed for privacy-preserving data mining. In this paper, we provide a review of the state-of-the-art methods for privacy. We discuss methods for randomization, k-anonymization, and distributed privacy-preserving data mining. We also discuss cases in which the output of data mining applications needs to be sanitized for privacy-preservation purposes. We discuss the computational and theoretical limits associated with privacy-preservation over high dimensional data sets.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

On the features and challenges of security and privacy in distributed internet of things

TL;DR: The purpose of this paper is to show that the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths.
Journal ArticleDOI

Information Security in Big Data: Privacy and Data Mining

TL;DR: This paper identifies four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker, and examines various approaches that can help to protect sensitive information.
Journal ArticleDOI

Multi-key privacy-preserving deep learning in cloud computing

TL;DR: This work presents a basic scheme based on multi-key fully homomorphic encryption (MK-FHE), and proposes a hybrid structure scheme by combining the double decryption mechanism and FHE, and proves that these two multi- key privacy-preserving deep learning schemes over encrypted data are secure.
Book ChapterDOI

Internet of Things: an overview

TL;DR: In this article, the authors highlight research on topics that include proposed architectures, security and privacy, and network communication means and protocols; they eventually conclude by providing details of future directions and open challenges that face the IoT development.
Journal ArticleDOI

Data quality in internet of things

TL;DR: Techniques for enhancing DQ in IoT are presented with a special focus on data cleaning techniques which are reviewed and compared using an extended taxonomy to outline their characteristics and their fitness for use for IoT.
References
More filters
Journal Article

The mathematical theory of communication

TL;DR: The Mathematical Theory of Communication (MTOC) as discussed by the authors was originally published as a paper on communication theory more than fifty years ago and has since gone through four hardcover and sixteen paperback printings.
BookDOI

Density estimation for statistics and data analysis

TL;DR: The Kernel Method for Multivariate Data: Three Important Methods and Density Estimation in Action.
Book ChapterDOI

Calibrating noise to sensitivity in private data analysis

TL;DR: In this article, the authors show that for several particular applications substantially less noise is needed than was previously understood to be the case, and also show the separation results showing the increased value of interactive sanitization mechanisms over non-interactive.
Journal Article

Calibrating noise to sensitivity in private data analysis

TL;DR: The study is extended to general functions f, proving that privacy can be preserved by calibrating the standard deviation of the noise according to the sensitivity of the function f, which is the amount that any single argument to f can change its output.
Proceedings ArticleDOI

How to generate and exchange secrets

TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.