{"title":"敏感和私人数据分析:系统回顾","authors":"Syeda Sana Zainab, Mohand Tahar Kechadi","doi":"10.1145/3341325.3342002","DOIUrl":null,"url":null,"abstract":"Each day an extensive amount of data is produced from various organisations, such as e-commerce, IT, hospitals, retail and supply chain, etc. Due to the expansion of computer devices and advances in technology this immense amount of data has been collected and analysed to support decision making. The examination of such data is advancing businesses and contributing advantageously to society in numerous diverse areas. However, serious privacy concerns are raised due to the storage and flow of potentially sensitive data [31]. Strategies that permit the knowledge extraction from the data, while protecting privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the analysis of private and sensitive data using various PPDM algorithms and techniques. We also highlighted their advantages and limitations within various contexts.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Sensitive and Private Data Analysis: A Systematic Review\",\"authors\":\"Syeda Sana Zainab, Mohand Tahar Kechadi\",\"doi\":\"10.1145/3341325.3342002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Each day an extensive amount of data is produced from various organisations, such as e-commerce, IT, hospitals, retail and supply chain, etc. Due to the expansion of computer devices and advances in technology this immense amount of data has been collected and analysed to support decision making. The examination of such data is advancing businesses and contributing advantageously to society in numerous diverse areas. However, serious privacy concerns are raised due to the storage and flow of potentially sensitive data [31]. Strategies that permit the knowledge extraction from the data, while protecting privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the analysis of private and sensitive data using various PPDM algorithms and techniques. We also highlighted their advantages and limitations within various contexts.\",\"PeriodicalId\":178126,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3341325.3342002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3341325.3342002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Sensitive and Private Data Analysis: A Systematic Review
Each day an extensive amount of data is produced from various organisations, such as e-commerce, IT, hospitals, retail and supply chain, etc. Due to the expansion of computer devices and advances in technology this immense amount of data has been collected and analysed to support decision making. The examination of such data is advancing businesses and contributing advantageously to society in numerous diverse areas. However, serious privacy concerns are raised due to the storage and flow of potentially sensitive data [31]. Strategies that permit the knowledge extraction from the data, while protecting privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the analysis of private and sensitive data using various PPDM algorithms and techniques. We also highlighted their advantages and limitations within various contexts.