Secret charing vs. encryption-based techniques for privacy preserving data mining

Warning The system is temporarily closed to updates for reporting purpose.

Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay (2007) Secret charing vs. encryption-based techniques for privacy preserving data mining. In: Joint UNECE/Eurostat Work Session on Statistical Disclosure Control,

[thumbnail of WP4.pdf] PDF
WP4.pdf

Download (123kB)

Abstract

Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data mining researchers to investigate privacy implications of data mining and how data mining can be performed without violating privacy. In this paper, we first provide an overview of privacy preserving data mining focusing on distributed data sources, then we compare two technologies used in privacy preserving data mining. The first technology is encryption based, and it is used in earlier approaches. The second technology is secret-sharing which is recently being considered as a more efficient approach.
Item Type: Papers in Conference Proceedings
Subjects: Q Science > QA Mathematics > QA075 Electronic computers. Computer science
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Erkay Savaş
Date Deposited: 08 Nov 2008 14:34
Last Modified: 26 Apr 2022 08:47
URI: https://research.sabanciuniv.edu/id/eprint/10217

Actions (login required)

View Item
View Item