首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Design of Smoke Screening Techniques for Data Surreptitiousness in Privacy Preserving Data Snooping Using Object Oriented Approach and UML
  • 本地全文:下载
  • 作者:K.Satheesh Kumar, Indumathi.J, G.V.Uma
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2008
  • 卷号:8
  • 期号:4
  • 页码:106-115
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:A smoke screen is a release of smoke in order to disguise the movement or location of military units such as infantry, tanks or ships. while smoke screens would formerly have been used to conceal movement from enemies line of sight, modern technology means that they are currently also available in new forms; they can screen in the infrared as well as visible spectrum of light to prevent detection by infrared sensors or viewers, available for vehicles is a super dense form used to prevent laser beams of enemy target designators or range finders on vehicles and to obscure the sensitive data. Surreptitiousness is used in the perspective of amassing a data trickily secret. In this paper, we focus primarily on solitude issues in Data Snooping, conspicuously when data are shared before mining, the means to shield it with Unified Modelling Language diagrams. The elucidation for competent systematization and sustain of facets, analysis, and diverse user groups are based on a common conceptual privacy model, and a concepts-services-mechanisms-algorithms-data scheme with use of UML or Unified Modelling Language. Tackling privacy preservation is complex since it should also pledge for well-founded Data Snooping results. Both these issues are equal and orthogonal in direction and it should clout a perfect balance between the two mechanisms. Under such state of affairs there arises the serious need for a rethinking mechanism to make obligatory privacy safeguards without trailing behind the gains of knowledge mining. These mechanisms can escort to novel privacy control methods to translate a database into a new one in such a way as to safeguard the main features of the original database for mining. Conscientiously, we deal with the problem of transforming a database to be shared into a new one that smoke screens clandestine information while preserving the general patterns and trends from the original database. To focus on this exigent problem, we propose an amalgamated scaffold for Privacy Preserving Data Mining that ensures that the mining process will not trespass privacy up to a certain degree of security. The scaffold framework encompasses a family of privacy-preserving data transformation methods and library of algorithms. Our exploration concludes that our Privacy Preserving Data Mining framework is effective, meets privacy requirements, and guarantees well-founded Data Snooping results while shielding vulnerable information (e.g., sensitive knowledge and individuals' privacy).
  • 关键词:Association Rules, Clustering, Confidence, Data Snooping, Data Sanitization, Privacy, Privacy Preserving Data Mining, Sensitive Data, Smoke Screening, Surreptitiousness, Unified Modelling Language
国家哲学社会科学文献中心版权所有