Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this

Table Of Contents

1.1 Objectives
1.2.1 Protecting the Sensitive Data
1.2.2 Secure Multiparty Computation
1.2.3 Protecting the Sensitive Knowledge
1.2.4 Association Rules Hiding
1.2.5 Classification Rule Hiding
1.3 Motivation
1.4.1 A
1.4.2 B
1.5 Problems identified
1.6 Thesis outline
2.1.1 Business transactions:
2.1.2 Scientific data:
2.1.3 Medical and personal data:
2.1.4 Surveillance video and pictures:
2.1.5 Satellite sensing:
2.1.6 Games:
2.1.7 Digital media:
2.1.8 CAD and Software engineering data:
2.1.9 Virtual Worlds:
2.1.10 Text reports and memos like e-mail messages:
2.1.11 The World Wide Web repositories:
2.2 Data Mining and Knowledge Discovery
2.3 Data Mining in Business
2.4 Privacy, Ethics and Data mining
2.5.1 Security and social issues:
2.5.2 User interface issues:
2.5.3 Mining methodology issues:
2.5.4 Performance issues:
2.5.5 Data source issues:
3.1.1 Semi-honest adversaries
3.1.2 Privacy-Preserving Data Publishing:
3.1.3 Changing the results of Data mining applications to preserve privacy:
3.1.4 Query Auditing
3.1.5 Cryptographic Methods for Distributed Privacy:
3.1.6 Secure computation and privacy-preserving data mining
3.1.7 Privacy-Preserving Data Mining Algorithms:
3.1.8 Distributed privacy preservation:
4.1.1 Removing variables
4.1.2 Removing records
4.1.3 Global recoding
4.1.4 Top and bottom coding
4.1.5 Local suppression
4.2.1 Micro-aggregation
4.2.2 Data swapping
4.2.3 PRAM
4.2.4 Adding noise
4.2.6 Synthetic micro-data
5.1 k -Anonymity
5.2.1 Homogeneity Attack:
5.2.2 Background Knowledge Attack:
5.3 t - Closeness:
5.4.1 Group Based Anonymization
5.4.2 Group based Anonymization applied in Secure multiparty communication
6.1 Conclusion
6.2 Future research
9 4760* ≤ 40 10K s
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 3,364|Likes:
Published by Nitin Mishra

More info:

Published by: Nitin Mishra on Apr 08, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, DOC, TXT or read online from Scribd
See More
See less





You're Reading a Free Preview
Pages 4 to 57 are not shown in this preview.
You're Reading a Free Preview
Pages 61 to 69 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Govind Gautam liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->