{"title":"Investigation on Privacy-Preserving Techniques For Personal Data","authors":"Rafik Hamza, K. Zettsu","doi":"10.1145/3463944.3469267","DOIUrl":null,"url":null,"abstract":"Privacy protection technology has become a crucial part of almost every existing cross-data analysis application. The privacy-preserving technique allows sharing sensitive personal information and preserves the users' privacy. This new trend influences data collection results by improving the analytical accuracy, increasing the number of participants, and better understand the participants' environments. Herein, collecting these personal data is significant to many advantageous applications such as health monitoring. Nevertheless, these applications encounter real privacy threats and concerns about handling personal information. This paper aims to determine privacy-preserving personal data mining technologies and analyze these technologies' advantages and shortcomings. Our purpose is to provide an in-depth understanding of personal data privacy and highlight important viewpoints, existing challenges, and future research directions.","PeriodicalId":394510,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3463944.3469267","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Privacy protection technology has become a crucial part of almost every existing cross-data analysis application. The privacy-preserving technique allows sharing sensitive personal information and preserves the users' privacy. This new trend influences data collection results by improving the analytical accuracy, increasing the number of participants, and better understand the participants' environments. Herein, collecting these personal data is significant to many advantageous applications such as health monitoring. Nevertheless, these applications encounter real privacy threats and concerns about handling personal information. This paper aims to determine privacy-preserving personal data mining technologies and analyze these technologies' advantages and shortcomings. Our purpose is to provide an in-depth understanding of personal data privacy and highlight important viewpoints, existing challenges, and future research directions.