Output Privacy Protection With Pattern-Based Heuristic Algorithm
نویسندگان
چکیده
منابع مشابه
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Privacy Preserving Data Mining(PPDM) is an ongoing research area aimed at bridging the gap between the collaborative data mining and data confidentiality There are many different approaches which have been adopted for PPDM, of them the rule hiding approach is used in this article. This approach ensures output privacy that prevent the mined patterns(itemsets) from malicious inference problems. A...
متن کاملAlgorithm-irrelevant Privacy Protection Method Based on Randomization
Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...
متن کاملµ-Fractal Based Data Perturbation Algorithm For Privacy Protection
Many organizations publish anonymous medical data for sociology research, health research, education and other useful studies. Although attributes that clearly identify individuals, such as name and certain personal identity numbers are removed, the combination of some other information, like the date of birth, gender, post-code etc. can still be used to identify an individual. Existing data pe...
متن کاملA Hybrid Meta-Heuristic Algorithm based on Imperialist Competition Algorithm
The human has always been to find the best in all things. This Perfectionism has led to the creation of optimization methods. The goal of optimization is to determine the variables and find the best acceptable answer Due to the limitations of the problem, So that the objective function is minimum or maximum. One of the ways inaccurate optimization is meta-heuristics so that Inspired by nature, ...
متن کاملLocation privacy protection algorithm for mobile networks
Mobile users often post nearest neighbor queries based on their current location. Usually, the mobile terminal (user) sends a request to query an untrusted location server, including the position information of the mobile terminal requests, thus leading to the disclosure of one’s location. For mobile users providing location services, the privacy of mobile users is crucial. This demand is parti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science and Information Technology
سال: 2014
ISSN: 0975-4660,0975-3826
DOI: 10.5121/ijcsit.2014.6210