Privacy-preserving data mining in peer to peer networks
Hussain , I, Irakleous , M, Siddiqi, MA and Saraee, M 2020, 'Privacy-preserving data mining in peer to peer networks' , in: UNSPECIFIED , GSTF .
|PDF - Submitted Version |
Download (194kB) | Preview
In recent years, privacy-preserving data mining has been studied extensively, due to the wide increase of sensitive information on the internet. A number of algorithms and procedures have been designed, some of which are yet to be implemented, but a few of them are actually employed in the form of software systems to preserve the privacy of users, and the content in peer-to-peer networks. Privacy issues are becoming widely recognized when using peer-to-peer networks. In this paper, we provide a review of the privacy-preserving data mining techniques used in order to overcome privacy issues. We discuss methods of sanitization, data distortion, data hiding, cryptography and the data mining algorithm KDEC. Further discussion involves data transfer using proxy techniques, creating social communities among peer-to-peer users forming trusted peers. These techniques have shown to administer the issue of preserving data however show lack of scalability and performance. We design a framework to perform a comparison study on the techniques shown above and present the results with some recommendations of how we think the issues could be unraveled.
|Item Type:||Book Section|
|Themes:||Media, Digital Technology and the Creative Economy|
|Schools:||Colleges and Schools > College of Science & Technology > School of Computing, Science and Engineering > Data Mining and Pattern Recognition Research Centre|
|Journal or Publication Title:||Proceedings of the Annual International Conference on Data Analysis, Data Quality & Metadata Management (DAMD 2010 )|
|Depositing User:||Dr Mo Saraee|
|Date Deposited:||27 Oct 2011 11:26|
|Last Modified:||06 Jun 2013 10:13|
Document DownloadsMore statistics for this item...
Actions (login required)
|Edit record (repository staff only)|