Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2023, 6(8); doi: 10.25236/AJCIS.2023.060805.

Algorithms Feasibility Inquiry Based on Data Mining in Privacy

Author(s)

Linhai Tan

Corresponding Author:
Linhai Tan
Affiliation(s)

School of Artificial Intelligence, Hunan Vocational College of Science & Technology, Changsha, China

Abstract

This paper firstly summarizes the current research status of privacy protection data mining algorithms and the significance of researching privacy protection data mining; and then according to the different distribution of data objects, this paper discusses the corresponding privacy protection mining methods of integrated data and distributed data respectively, and then it analyses and studies association rule mining algorithms and SVM classification mining algorithms; And focusing on distributed database system classification data mining which is horizontal distribution, privacy protection classification algorithm based on the SVM is proposed. The mathematical model has been established, and experimented with the method of computer simulation. The results show that the algorithm has certain stability under the circumstances of distributed node increases, and the algorithm is feasible and has a practical guiding significance.

Keywords

privacy protection, integrated data, Distributed, association rule mining, SVM classification mining

Cite This Paper

Linhai Tan. Algorithms Feasibility Inquiry Based on Data Mining in Privacy. Academic Journal of Computing & Information Science (2023), Vol. 6, Issue 8: 46-51. https://doi.org/10.25236/AJCIS.2023.060805.

References

[1] Yao Yao, Ji Genlin. Distributed Clustering Algorithm Based on Privacy Protection [J]. Computer Science, 2009, 36(3):100-102 

[2] Chen Xiaoming, Li Junhuai, Peng Jun, etc. A Survey of Preserving Data Mining Algorithms [J]. Computer Science, 2007, 34(6):183-186, 19

[3] Chen Wenwei, Huang Jincai, Zhao Xinyu. Date Mining technology [M]. Beijing: Beijing University of Technology Press, 2002. 5-6

[4] Ma Tinghuai, Tang Meili. Date Mining Based on Privacy Protection [J]. Computer Engineering, 2008. 5 

[5] Zhang Peng, Tong Yunhai, Tang Shiwei and etc. An effective Method for Privacy Preserving Association Rule Mining [J]. Journey of Software, 2006, 17(8):1765-1774 

[6] Zhang Yuanping, Zhong Bo. Error Analysis for an Algorithm of Privacy-preserving Rule Mining [J]. Computer Science, 2006, 33(8):82-84

[7] Liu Yinghua, Yang Bingru, Ma Na and etc. State of the art in distributed privacy preserving data mining [J]. Application Research of Computers, 2011, 28(10):3606-3610

[8] Mi, C., et al., A novel experimental teaching approach for electrical engineering based on semi-physical simulation [J]. World Transactions on Engineering and Technology Education, 2014, 12(4):p. 779-783.