科学与财富
科學與財富
과학여재부
SCIENCES & WEALTH
2014年
4期
247-248
,共2页
数据挖掘%隐私保护%已知信息
數據挖掘%隱私保護%已知信息
수거알굴%은사보호%이지신식
data mining%privacy protection%known information
通过研究数据挖掘隐私保护,借助乘法扰动算法,探索提出了一种全新的算法---已知信息独立分量分析(Known Knowledge Independent Component Analysis),这种算法可以从经过旋转扰动或随机投影变换的扰动数据得到近似值或者原始数据;紧接着,得出全新的乘法扰动隐私保护算法---局部旋转扰动方法(Partial Rotation Perturbation),此法能够有效抵御KK- ICA的攻击并且安全性更高。
通過研究數據挖掘隱私保護,藉助乘法擾動算法,探索提齣瞭一種全新的算法---已知信息獨立分量分析(Known Knowledge Independent Component Analysis),這種算法可以從經過鏇轉擾動或隨機投影變換的擾動數據得到近似值或者原始數據;緊接著,得齣全新的乘法擾動隱私保護算法---跼部鏇轉擾動方法(Partial Rotation Perturbation),此法能夠有效牴禦KK- ICA的攻擊併且安全性更高。
통과연구수거알굴은사보호,차조승법우동산법,탐색제출료일충전신적산법---이지신식독립분량분석(Known Knowledge Independent Component Analysis),저충산법가이종경과선전우동혹수궤투영변환적우동수거득도근사치혹자원시수거;긴접착,득출전신적승법우동은사보호산법---국부선전우동방법(Partial Rotation Perturbation),차법능구유효저어KK- ICA적공격병차안전성경고。
mining data privacy protection through research, with the multiplication perturbation algorithm is proposed to explore a new algorithm - known information independent component analysis (Known Knowledge Independent Component Analysis), this algorithm can be rotated through the disturbance or ran-dom projection transformation from approximations or perturbation data obtained raw data; Then, draw a new algorithm for multiplication disturbance Privacy -local rotation perturbation method (Partial Rotation Perturbation), this method can effectively resist the KK- ICA attack and more secure.