Classification of privacy-preserving distributed data mining protocols
Xu, Zhuojia and Yi, Xun (2011) Classification of privacy-preserving distributed data mining protocols. In: 2011 Sixth International Conference on Digital Information Management (ICDIM). IEEE, Piscataway, N.J., pp. 337-342.
Abstract
Recently, a new research area, named Privacy-preserving Distributed Data Mining (PPDDM) has emerged. It aims at solving the following problem: a number of participants want to jointly conduct a data mining task based on the private data sets held by each of the participants. This problem setting has captured attention and interests of researchers, practitioners and developers from the communities of both data mining and information security. They have made great progress in designing and developing solutions to address this scenario. However, researchers and practitioners are now faced with a challenge on how to devise a standard on synthesizing and evaluating various PPDDM protocols, because they have been confused by the excessive number of techniques developed so far. In this paper, we put forward a framework to synthesize and characterize existing PPDDM protocols so as to provide a standard and systematic approach of understanding PPDDM-related problems, analyzing PPDDM requirements and designing effective and efficient PPDDM protocols.
Dimensions Badge
Altmetric Badge
Additional Information | Conference held: Melbourne, 26-28 Sept., 2011 |
Item type | Book Section |
URI | https://vuir.vu.edu.au/id/eprint/9603 |
DOI | 10.1109/ICDIM.2011.6093356 |
Official URL | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumb... |
ISBN | 9781457715389 (print), 9781457715396 |
Subjects | Historical > FOR Classification > 0804 Data Format Historical > FOR Classification > 0806 Information Systems Historical > SEO Classification > 8903 Information Services Historical > Faculty/School/Research Centre/Department > School of Engineering and Science |
Keywords | ResPubID23621, classification, data security, PPDDM requirements, information security, private data sets, data privacy, protocols, classification algorithms, cryptography, data models, data privacy, distributed databases |
Citations in Scopus | 20 - View on Scopus |
Download/View statistics | View download statistics for this item |