Secret charing vs. encryption-based techniques for privacy preserving data mining

Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay (2007) Secret charing vs. encryption-based techniques for privacy preserving data mining. In: Joint UNECE/Eurostat Work Session on Statistical Disclosure Control,

PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader

Official URL: http://epp.eurostat.ec.europa.eu/pls/portal/docs/PAGE/PGP_DS_CONFERENCES/PGE_CONFERENCES/PGE_UNECE/TAB70736602/WP4.PDF


Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data mining researchers to investigate privacy implications of data mining and how data mining can be performed without violating privacy. In this paper, we first provide an overview of privacy preserving data mining focusing on distributed data sources, then we compare two technologies used in privacy preserving data mining. The first technology is encryption based, and it is used in earlier approaches. The second technology is secret-sharing which is recently being considered as a more efficient approach.

Item Type:Papers in Conference Proceedings
Subjects:Q Science > QA Mathematics > QA075 Electronic computers. Computer science
ID Code:10217
Deposited By:Erkay Savaş
Deposited On:08 Nov 2008 14:34
Last Modified:19 Jul 2019 16:38

Repository Staff Only: item control page