Book ChapterDOI
A General Survey of Privacy-Preserving Data Mining Models and Algorithms
Charu C. Aggarwal,Philip S. Yu +1 more
- pp 11-52
TLDR
This paper provides a review of the state-of-the-art methods for privacy, including methods for randomization, k-anonymization, and distributed privacy-preserving data mining, and the computational and theoretical limits associated with privacy- Preserving over high dimensional data sets.Abstract:
In recent years, privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. A number of algorithmic techniques have been designed for privacy-preserving data mining. In this paper, we provide a review of the state-of-the-art methods for privacy. We discuss methods for randomization, k-anonymization, and distributed privacy-preserving data mining. We also discuss cases in which the output of data mining applications needs to be sanitized for privacy-preservation purposes. We discuss the computational and theoretical limits associated with privacy-preservation over high dimensional data sets.read more
Citations
More filters
Journal ArticleDOI
On the features and challenges of security and privacy in distributed internet of things
TL;DR: The purpose of this paper is to show that the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths.
Journal ArticleDOI
Information Security in Big Data: Privacy and Data Mining
TL;DR: This paper identifies four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker, and examines various approaches that can help to protect sensitive information.
Journal ArticleDOI
Multi-key privacy-preserving deep learning in cloud computing
TL;DR: This work presents a basic scheme based on multi-key fully homomorphic encryption (MK-FHE), and proposes a hybrid structure scheme by combining the double decryption mechanism and FHE, and proves that these two multi- key privacy-preserving deep learning schemes over encrypted data are secure.
Book ChapterDOI
Internet of Things: an overview
TL;DR: In this article, the authors highlight research on topics that include proposed architectures, security and privacy, and network communication means and protocols; they eventually conclude by providing details of future directions and open challenges that face the IoT development.
Journal ArticleDOI
Data quality in internet of things
TL;DR: Techniques for enhancing DQ in IoT are presented with a special focus on data cleaning techniques which are reviewed and compared using an extended taxonomy to outline their characteristics and their fitness for use for IoT.
References
More filters
Journal Article
The mathematical theory of communication
Claude E. Shannon,Warren Weaver +1 more
TL;DR: The Mathematical Theory of Communication (MTOC) as discussed by the authors was originally published as a paper on communication theory more than fifty years ago and has since gone through four hardcover and sixteen paperback printings.
BookDOI
Density estimation for statistics and data analysis
TL;DR: The Kernel Method for Multivariate Data: Three Important Methods and Density Estimation in Action.
Book ChapterDOI
Calibrating noise to sensitivity in private data analysis
TL;DR: In this article, the authors show that for several particular applications substantially less noise is needed than was previously understood to be the case, and also show the separation results showing the increased value of interactive sanitization mechanisms over non-interactive.
Journal Article
Calibrating noise to sensitivity in private data analysis
TL;DR: The study is extended to general functions f, proving that privacy can be preserved by calibrating the standard deviation of the noise according to the sensitivity of the function f, which is the amount that any single argument to f can change its output.
Proceedings ArticleDOI
How to generate and exchange secrets
TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.