Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Data mining: concepts and techniques
Data mining: concepts and techniques
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Datafly: A System for Providing Anonymity in Medical Data
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Coding and Information Theory
Privacy preserving churn prediction
Proceedings of the 2009 ACM symposium on Applied Computing
International Journal of Data Analysis Techniques and Strategies
Hi-index | 0.00 |
Many data mining applications deal with large data sets that contain private information that must be protected. This has led to the development of many privacy-preserving data mining techniques. Many of these techniques use randomized data distortion by adding noise to the sensitive data. However, non-careful noise addition may introduce biases to the statistical parameters of these data, including means and variances. To meet privacy requirements and preserve the statistical properties of the sensitive data we use a data transformation technique called Rotation-Based Transformation (RBT). This method distorts only confidential numerical attributes and preserves the statistical properties of the data.