Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (1): 18-26.doi: 10.11959/j.issn.2096-109x.2016.00021
• Comprehensive Reviews • Previous Articles Next Articles
Jiao WANG1,Ke-feng FAN2,Yong WANG3
Revised:
2016-01-08
Online:
2016-01-01
Published:
2016-02-16
Supported by:
CLC Number:
Jiao WANG,Ke-feng FAN,Yong WANG. Progress of research on privacy protection for data publication and data mining[J]. Chinese Journal of Network and Information Security, 2016, 2(1): 18-26.
[51] | ISO/IEC JTC1/SC27.Information technology-security techniques-privacy framework[S]. |
[52] | ISO/IEC JTC1/SC27.Information technology-security techniques-code of practice for PII protection in public clouds acting as PII processors[S]. |
[53] | ISO/IEC JTC1/SC27.Information technology-security techniques-Privacy capability assessment model[S]. |
[54] | ISO/IEC JTC1/SC27.Information technology-security techniques-privacy impact assessment-methodology[S]. |
[1] | 李国杰, 程学旗 . 大数据研究: 未来科技及经济社会发展的重大战略领域—大数据的研究现状与科学思考[J]. 中国科学院院刊, 2012,27(6). |
LI G J , CHENG X Q . Big data study:a major strategic area-the re-search status of big data and scientific reflection[J]. Bulletin of Chinese Academy of Sciences, 2012,27(6). | |
[2] | CLIFFORD L . Big data[J]. Nature, 2008,455(7209): 1-136. |
[3] | 孟小峰, 慈祥 . 大数据管理:概念、技术与挑战[J]. 计算机研究与发展 2013,50(1): 146-169. |
MENG X F , CI X . Big data management:conception,technology and challenge[J]. Computer Research and Development, 2013,50(1): 146-169. | |
[4] | 官思发, 朝乐门 . 大数据时代信息分析的关键问题、挑战与对策[J]. 图书情报工作, 2015,59(3): 12-18. |
GUAN S F , CHAO L M . The problem,challenge and countermea-sure of the big data information analysis[J]. Library and Informa-tion Service, 2015,59(3): 12-18. | |
[5] | WARREN S D , BRANDEIS L D . The right to privacy[J]. Harvad Law Review, 1973,4(6): 193-220. |
[6] | ADAM N R , WORTMANNJ C . Security control methods for statistical databases: a comparative study[J]. ACM Computing Surveys, 1989,21(4): 515-556. |
[7] | AGRAWAL R , SRIKANT R . Privacy-preserving data mining[J]. Sigmod Record, 2000,29(2): 439-450. |
[8] | CLIFTYON C , KANTARCIOGLU M , VAIDYA J , et al. Tools for privacy preserving distributed data mining[J]. ACM SIGKDD Ex-plorations, 2003,4(2). |
[9] | MCINTYRE S E , MCLNTYRE J . Data swapping: variations on a theme by dalenius and reiss[J]. Lecture Notes in Computer Science, 2004: 14-29. |
[10] | KARGUPTA H , DAS K , LIU K . Multi-party, privacy-preserving distributed data mining using a game theoretic framework[C]// The 11st European conference on Principles and Practice of Knowledge Discovery in Databases. Berlin Heidelberg: Springer-Verlag,c 2007:523-531. |
[11] | XU L , JIANG C X , WANG J , et al. Information security in big data:privacy and data mining[J]. IEEE Access, 2014,2: 1-28. |
[12] | 李晓晔, 孙振龙, 邓佳宾, , 等. 隐私保护技术研究综述[J]. 计算机科学, 2013,40: 199-202. |
LI X H , SUN Z L , DENG J B , et al. Review of privacy protection[J]. Computer Science, 2013,40: 199-202. | |
[13] | KARGUPTA H , DATTA S , WANG Q , et al. On the privacy pre-serving properties of random data perturbation techniques[C]// IEEE International Conference on Data Mining.c 2003: 99. |
[14] | 张鹏, 童云海, 唐世渭, , 等. 一种有效的隐私保护关联规则挖掘方法[J]. 软件学报, 2006,17(8): 1764-1774. |
ZHANG P , TONG Y H , TANG S W , et al. An effective method of digging privacy protection assotionation rule[J]. Journal Software, 2006,17(8): 1764-1774. | |
[15] | ELMAGARMID A K , VERYKIOS V S , SAYGIN Y . Privacy pre-serving association rule mining[C]// Twelfth International Work-shop Research Issues in Data Engineering: Engineering E-Commercr/E-Business Systems. c 2002: 151-158. |
[16] | AGRAWAL R , SRIKANT R . Privacy preserving data mining[J]. ACM Sigmod Record, 2000,29(2): 439-450. |
[17] | 张海涛, 黄慧慧, 徐亮, , 等. 隐私保护数据挖掘研究进展[J]. 计算机应用研究, 2013,30(12): 3529-3535. |
ZHANG H T , HANG H H , XU L , et al. Progress of private protection data mining[J]. Application Research of Computers, 2013,30(12): 3529-3535. | |
[18] | SAYGM Y I , VERYKIOS V S , CLIFTON C . Using unknowns to prevent discovery of association rules[J]. ACM Sigmod Record, 2001,30(4): 45-54. |
[19] | OLIVEIRA S R M , ANE O . Privacy preserving frequent itemset mining[C]// IEEE International Conference on Privacy, Security and Data Mining. c 2002: 43-54. |
[20] | AGGARWAL C C , YU P S , et al. A condensation approach to privacy preserving data mining[M]// 9th International Conference on Extending Ratakase Technology, Heraklion, Crete. Berlin Hei-delberg: Springer,c 2004: 183-199. |
[21] | ESTIVILL V , BRANKOVIC L . Data swapping: balancing privacy against precision in mining for logic rules[J]. Lecture Notes in Computer Science, 1999: 389-398. |
[22] | FORESTI S , PARABOSCHI S , PELOSI G , et al. Protecting access confidentiality with data distribution and swapping[C]// Big Data and Cloud Computing. c 2014: 167-174. |
[23] | SAMARATI P , SWEENEY L . Protecting privacy when disclosing information: K-anonymity and its enforcement through generaliza-tion and suppression[C]// IEEE Symposium on Research in Security and Privacy, Chicago.c 1998. |
[24] | SWEENEY L . K-anoymity: a model for protecting privacy[J]. International Journal of Uncertainty Fuzziness & Knowledge Based Systems, 2002,10(5): 557-570. |
[25] | 杨晓春, 刘向宇, 王斌, , 等. 支持多约束的 K-匿名化方法[J]. 软件学报, 2006,17(5): 1222-1231. |
YANG X C , LIU X Y , WANG B , et al. K-anonymous method of multiple constrains supported[J]. Journals of Software, 2006,17(5): 1222-1231. | |
[26] | MACHANAVAJJHALA A , GEHRKE J , KIFER D , et al L- diver-sity: privacy beyond k-anonymity[C]// IEEE International Confer-ence on Data Engineering.c 2006: 24. |
[27] | 王波, 杨静 . 一种基于逆聚类的个性化隐私匿名方法[J]. 电子学报, 2012,40(5): 883-890. |
WANG B , YANG J . An anonymity privacy method based on invese clustering[J]. Acta Electronica Sinica, 2012,40(5): 883-890. | |
[28] | 刘英华, 杨炳儒, 马楠 , 等. 分布式隐私保护数据挖掘研究[J]. 计算机应用研究 2011,28(10): 3606-3610. |
LIU Y H , TANG B R , MA N , et al. Study of distributed privacy protection[J]. Application Research of Computers, 2011,28(10): 3606-3610. | |
[29] | LI N , LI T , VENKATASUBRAMANIAN S . T-closeness: privacy beyond k-anonymity and l-diversity[C]// IEEE International Con-ference on Data Engineering. c 2007: 106-115. |
[30] | 汤琳, 何丰 . 隐私保护的数据挖掘方法的研究[J]. 计算机技术与发展, 2011,21: 156-159. |
TANG L , HE F . Study of data mining method based on privacy protection[J]. Computer technology and Development, 2011,21: 156-159. | |
[31] | YAO A C . How to generate and exchange secrets[C]// IEEE Sympo-sium on Foundations of Computer Science. c 1986: 162-167. |
[32] | RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms[J]. Foundations of Secure Computa-tions, 1978: 169-179. |
[33] | 钱萍, 吴蒙 . 同态加密隐私保护数据挖掘方法综述[J]. 计算机应用研究, 2011,28(5): 1614-1617. |
QIAN P , WU M . Review of privacy protection data mining based on homomorphic encryption[J]. Application Research of Com-puters, 2011,28(5): 1614-1617. | |
[34] | GENTRY C . Fully homomorphic encryption using ideal lat-tices[C]// Annual ACM Symposium on Theory of Computing.c 2009: 169-178. |
[35] | RIVST R L , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communica-tions of the ACM, 1978,21: 120-126. |
[36] | PAILLER P . Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology -Eurocrypt, 1999,547(1): 223-238. |
[37] | DHAKAR R S , GUPTA A K, , SHARMA P . Modified RSA encryption algorithm (MREA)[C]// IEEE International Conference on Advanced Computing and Communication Technologies,c 2012: 426-429. |
[38] | ZHAN J , MATWIN S , CHANG L . Privacy-preserving collabora-tive association rule mining[J]. Journal of Network & Computer Applications, 2007,30(3): 1216-1227. |
[39] | ZHANG Y , CHEN Q , ZHONG S . Efficient and privacy-preserving min and k-th min computations in mobile sensing systems[J]. IEEE Transactions on Dependable & Secure Computing, 2015: 1. |
[40] | 夏超 . 同态加密技术及其应用研究[D]. 合肥:安徽大学, 2013. |
XIA C . Study of homomorphic encryption technology and applica-tion[D]. Hefei:Anhui University, 2013. | |
[41] | 陈智罡, 王箭, 宋新霞 . 全同态加密研究[J]. 计算机应用研究, 2014,31(6): 1624-1630. |
CHEN Z Z , WANG J , SONG X X . Study of homomorphic encryp-tion[J]. Application Research of Computers, 2014,31(6): 1624-1630. | |
[42] | ZHAN J . Using homomorphic encryption for privacy-preserving collaborative decision tree classification[C]// Computational Intelli-gence and Data Mining.c 2007: 637-645. |
[43] | GE X , YAN L , ZHU J , et al. Privacy-preserving distributed associa-tion rule mining based on the secret sharingtechnique[C]// The 2nd International Conference on IEEE Software Engineering and Data Mining. c 2010: 345-350. |
[44] | 孙吉贵, 刘杰, 赵连宇 . 聚类算法研究[J]. 软件学报 2008,19(1): 48-61. |
SUN J G , LIU J , ZHAO L Y . Study of clustering algorithrm[J]. Journals of Software, 2008,19(1): 48-61. | |
[45] | BIERNACKI C . Initializing EM using the properties of its trajecto-ries in Gaussian mixtures[J]. Statistics & Computing, 2004,14(3): 267-279. |
[46] | BIERNACI C , CELEUX G , GOVAERT G . Choosing starting values for the EM algorithm for getting the highest likelihood in multivariate Gaussian mixture models[J]. Computational Statistics & Data Analysis, 2003,41(3/4): 561-575. |
[47] | LIN X , CLIFTON C , ZHU M . 2005. Privacy-preserving clustering with distributed EM mixture modeling[J]. Knowledge & Informa-tion Systems, 2005,8(1): 68-81. |
[48] | DUNG L T , BAO H T . Privacy preserving EM-based cluster-ing[C]// International Conference on IEEE Computing and Commu-nication Technologies. 2009: 1-7. |
[49] | JHA S , KRUGER L , MCDANIEL P . Privacy Preserving Cluster-ing[C]// 10th European Symposium on Research in Computer Secu-rity, Milan. Berlin Heidelberg: Springer, 2005: 397-417. |
[50] | VAIDYA J , CLIFTON C . Privacy-preserving k-means clustering over vertically partitioned data[C]// Ninth ACM Sigkdd Interna-tional Conference on Knowledge Discovery & Data Mining. c 2003: 206-215. |
[1] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[2] | Qiang LIU, Pengfei LI, Zhangjie FU. Secure controlling method for scalable botnets [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 42-55. |
[3] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[4] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[5] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[6] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[7] | Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU. Identity-based anonymous cloud auditing scheme with compact tags [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168. |
[8] | Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG. Online medical privacy protection strategy under information value-added mechanism [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177. |
[9] | Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG. Access control relationship prediction method based on GNN dual source learning [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55. |
[10] | Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU. Hardcoded vulnerability detection approach for IoT device firmware [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 98-110. |
[11] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[12] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[13] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[14] | Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU. Fast handover authentication scheme in 5G mobile edge computing scenarios [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168. |
[15] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|