Enhancements to privacy preserving data mining for maintaining sensitive data security / Abouelela Abdou Abouelela Hussien ; Supervised Hesham Ahmed Hefny , Nagy Ramadan Darwish
Material type:
- تحسينات على صيانة خصوصية تنقيب البيانات للحفاظ على أمن البيانات الحساسة [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2016.Ab.E (Browse shelf(Opens below)) | Not for loan | 01010110071391000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2016.Ab.E (Browse shelf(Opens below)) | 71391.CD | Not for loan | 01020110071391000 |
Thesis (Ph.D.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Science
Although data mining is an increasingly important technology for extracting useful knowledge hidden in huge collections of data, there are, however, negative social perceptions about data mining, among which are potential privacy violation and potential discrimination. For this reason, privacy preserving data mining has been introduced for protecting individual privacy. The initial idea of privacy preserving data mining (PPDM) was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Through studying many privacy techniques depending on k-anonymity technique, there are two main problems facing publishers that need to be solved as explained in the next lines: Problem No.1: How to maintain privacy when multiple sensitive attributes are presented in released data because while a data publisher attempts to protect one sensitive attribute may cause disclosure of identity due to another one. Problem No.2: How to operate privacy preserving data mining techniques on original data to maintain privacy using k-anonymity technique without affecting data utility and accuracy
Issued also as CD
There are no comments on this title.