首页> 外文会议>International Conference on Advances in Computing, Communication Control and Networking >Review on Privacy Preservation Methods in Data Mining Based on Fuzzy Based Techniques
【24h】

Review on Privacy Preservation Methods in Data Mining Based on Fuzzy Based Techniques

机译:基于模糊基于模糊技术的数据挖掘隐私保存方法综述

获取原文

摘要

The most significant motivation behind calculations in data mining will play out excavation on incomprehensible past examples since the extremely large data size. During late occasions there are numerous phenomenal improvements in data assembling because of the advancement in the field of data innovation. Lately, Privacy issues in data Preservation didn't get a lot of consideration in the process mining network; nonetheless, a few protection safeguarding procedures in data change strategies have been proposed in the data mining network. There are more normal distinction between data mining and cycle mining exist yet there are key contrasts that make protection safeguarding data mining methods inadmissible to mysterious cycle data. Results dependent on the data mining calculation can be utilized in different regions, for example, Showcasing, climate estimating and Picture Examination. It is likewise uncovered that some delicate data has a result of the mining calculation. Here we can safeguard the Privacy by utilizing PPT (Privacy Preservation Techniques) strategies. Important Concept in data mining is privacy preservation Techniques (PPT) because data exchanged between different persons needs security, so that other persons didn’t know what actual data transferred between the actual persons. Preservation in data mining deals that not showing the output information / data in the data mining by using various methods while the output data is precious. There are two techniques used for privacy preservation techniques. One is to alter the input information / data and another one is to alter the output information / data. The method is proposed for protection safeguarding in data base environmental factors is data change. This capacity has fuzzy three-sided participation with this strategy for data change to change the first data collection.
机译:数据挖掘中的计算背后的最大动机将在由于极大的数据大小以来,在难以理解的过去的例子上发出挖掘。在晚间期间,由于数据创新领域的进步,数据组装具有许多现象的改进。最近,数据保存中的隐私问题并没有在流程挖掘网络中得到很多考虑;尽管如此,在数据挖掘网络中提出了一些数据变更策略中的一些保护保障程序。数据挖掘和循环挖掘之间存在更正常的区别,但是有一个关键对比使保护保护数据挖掘方法不可受到神秘的循环数据。依赖于数据挖掘计算的结果可以在不同的区域中使用,例如,展示,气候估算和图像检查。同样揭示了一些细腻的数据具有挖掘计算的结果。在这里,我们可以通过利用PPT(隐私保存技术)策略来保护隐私。数据挖掘中的重要概念是隐私保存技术(PPT),因为在不同人之间交换的数据需要安全性,因此其他人不知道实际人之间传输的实际数据。数据挖掘中的保存在输出数据是珍贵的同时,不使用各种方法显示数据挖掘中的输出信息/数据。有两种用于隐私保存技术的技术。一个是改变输入信息/数据,另一个是改变输出信息/数据。提出该方法以保护数据库环境因素的保护保障是数据变化。此容量具有模糊的三方参与,有关此策略进行数据更改以更改第一个数据收集。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号