数据挖掘中保护隐私的优化技术

K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran
{"title":"数据挖掘中保护隐私的优化技术","authors":"K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran","doi":"10.1109/ICECCT56650.2023.10179655","DOIUrl":null,"url":null,"abstract":"Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimization techniques for preserving privacy in data mining\",\"authors\":\"K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran\",\"doi\":\"10.1109/ICECCT56650.2023.10179655\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.\",\"PeriodicalId\":180790,\"journal\":{\"name\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCT56650.2023.10179655\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

数据挖掘是一个重要的领域,它在从大量数据中提取重要因素和趋势方面发挥着主导作用。这涵盖了医疗保健、教育、娱乐、金融、电子商务应用等各个领域,数据挖掘领域使用了各种算法,包括监督、无监督、半监督和强化学习技术。在医疗保健领域,它处理大量敏感数据,如患者的姓名、年龄、健康记录等数据。这些敏感数据被入侵者用来提取原始数据,也成为授权访问的猎物。因此,隐私问题是需要解决的严重问题之一。数据挖掘(PPDM)中的各种隐私保护技术,如匿名化、微扰、凝聚和加密方法,可用于保护这些数据。本文讨论了进化方法下的遗传算法(GA)和元启发式方法下的粒子群优化(PSO)等优化技术,以及它们如何通过保护敏感和重要信息不被非法访问来提供更优的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimization techniques for preserving privacy in data mining
Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信