Advertisement

Abstract

The privacy preserving data mining technique researches have gained much attention in recent years. For data stream systems, wireless networks and mobile devices, the related stream data mining techniques research is still in its’ early stage. In this paper, an data mining algorithm dealing with privacy preserving problem in data stream is presented.

Keywords

Privacy preserving Data stream Data mining 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aggarwal, C., Han, J., Wang, J., Yu, P.S.: A Framework for Clustering Evolving Data Streams. In: Proc. 2003 Int. Conf. on Very Large Data Bases (VLDB 2003), Berlin, Germany (2003)Google Scholar
  2. 2.
    Giannella, C., Han, J., Pei, J., Yan, X., Yu, P.S.: Mining Frequent Patterns in Data Streams at Multiple Time Granularities. In: Kargupta, H., Joshi, A., Sivakumar, K., Yesha, Y. (eds.) Next Generation Data Mining, AAAI/MIT (2003)Google Scholar
  3. 3.
    Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and Issues in Data Stream Systems. In: Proceedings of PODS (2002)Google Scholar
  4. 4.
    Wright, R., Yang, Z.: Privacy-preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 713–718 (2004)Google Scholar
  5. 5.
    Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. ACM SIGMOD, 439-450 (2000)Google Scholar
  6. 6.
    Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules in Large Databases. In: VLDB, pp. 487–499 (1994)Google Scholar
  7. 7.
    Paillier, P.: Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–233. Springer, Heidelberg (1999)Google Scholar
  8. 8.
    Ostrovsky, R., Skeith, W.: Private Searching on Streaming Data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223–240. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Bethencourt, J., Song, D., Waters, B.: New Constructions and Practical Applications for Private Stream Searching. In: Proc. 2006 IEEE Symp. Security and Privacy (S&P 2006), p. 6 (2006)Google Scholar
  10. 10.
    Huang, Q.H.: Privacy Preserving Data Mining and Knowledge Discovery, Shanghai University Thesis, 60–70 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Qin-Hua Huang
    • 1
  1. 1.Modern Education Technique CenterShanghai University of Political Science and LawShanghaiChina

Personalised recommendations