TOP
紅利積點抵現金,消費購書更貼心
Data transformation approaches for privacy preserving data mining
滿額折

Data transformation approaches for privacy preserving data mining

商品資訊

定價
:NT$ 1216 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點 :36 點
商品簡介

商品簡介

Recent advances in data mining techniques facilitate to explore hidden knowledge from a large volume of data. When organizations share data for mining, they may restrict confidential information and knowledge to the other organizations. To protect sensitive information before data sharing, the modern age of information processing has evolved a new research area, namely Privacy Preserving Data Mining. Data transformation methods facilitate to preserve privacy without losing the benefit of data mining. The existing studies have dealt with data transformation methods for numerical data to preserve privacy in clustering and also data sanitization approaches to hide sensitive patterns. It is essential to devise new data transformation methods for categorical data to preserve privacy in clustering. The existing data sanitization approaches are capable of removing a number of legitimate patterns while concealing sensitive patterns. They also focus exclusively on specific pattern types. Nevertheless, it is necessary to develop new data sanitization approaches to hide sensitive patterns. In this work, to begin with, sensitive categorical data protection in clustering is addressed. Two hybrid data transformation methods have been devised to transform the sensitive categorical data. Then, their effectiveness in privacy preservation and clustering accuracy are validated. It is found that iv scaling and rotation transformation method improves the privacy level and the translation and rotation transformation method provides better accuracy in clustering. Hiding sensitive association rules are implemented by concealing the frequent itemsets. It includes the concepts of non-sensitive item conflict degree, item and transaction conflict ratio. Experimental results indicate that the use of item and transaction conflict ratio reduces the legitimate itemsets missed after sanitization. The work further focuses on sanitization approaches for privacy preservation of sensitive utility itemsets. With an intention to deal with this, two data sanitization approaches are devised using transaction conflict degree and item conflict degree. The experimental results indicate that the item conflict degree improves results in terms of the legitimate itemsets lost. Privacy preservation of utility and frequent itemset is also considered and two data sanitization approaches have been developed. Based on the experimental results, it can be observed that the item conflict ratio based sanitization approach minimizes non-sensitive itemsets missed and modifications in the original database. To summarize, the research works devised data transformation approaches by which privacy was ensured while maintaining accuracy in data mining

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 1216
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區