基于有效隐私保护数据挖掘技术的社交网络安全数据贡献与检索

Dharmendra Ambani, Kishor H. Atkotiya
{"title":"基于有效隐私保护数据挖掘技术的社交网络安全数据贡献与检索","authors":"Dharmendra Ambani, Kishor H. Atkotiya","doi":"10.1109/CCGE50943.2021.9776454","DOIUrl":null,"url":null,"abstract":"Privacy Preserving Data-Mining is the major use of data- mining methods for ensuring privacy of personal information. Data-mining algorithms search for the information that is most valuable. A major aspect of Privacy Preserving Data Mining is the safeguarding of sensitive information against unauthorized access. The Secure Data Contribution Retrieval algorithm assigns a privacy policy and security is assigned depending on the application needs and compatibility. This method is capable of meeting the requirements for numerous datasets. Currently, social media sites such as Facebook, Twitter, and YouTube are quite popular. Then, the expanded attribute-based encryption methodology allows users to transfer data contents across orbit software networks. Data leakage occurs during the gathering and storage of user Orbit Software Networks in an insecure distributed or centralized system. Third, the suggested Level by Level Security Optimization and Content Visualization algorithm helps prevent privacy problems when sharing information and visualizing data. They use privacy levels at the individual level following the assessment of the privacy compatibility of orbit software networks application. Experimental analysis employs the data from social datasets.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Data Contribution and Retrieval in Social Networks Using Effective Privacy Preserving Data Mining Techniques\",\"authors\":\"Dharmendra Ambani, Kishor H. Atkotiya\",\"doi\":\"10.1109/CCGE50943.2021.9776454\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Privacy Preserving Data-Mining is the major use of data- mining methods for ensuring privacy of personal information. Data-mining algorithms search for the information that is most valuable. A major aspect of Privacy Preserving Data Mining is the safeguarding of sensitive information against unauthorized access. The Secure Data Contribution Retrieval algorithm assigns a privacy policy and security is assigned depending on the application needs and compatibility. This method is capable of meeting the requirements for numerous datasets. Currently, social media sites such as Facebook, Twitter, and YouTube are quite popular. Then, the expanded attribute-based encryption methodology allows users to transfer data contents across orbit software networks. Data leakage occurs during the gathering and storage of user Orbit Software Networks in an insecure distributed or centralized system. Third, the suggested Level by Level Security Optimization and Content Visualization algorithm helps prevent privacy problems when sharing information and visualizing data. They use privacy levels at the individual level following the assessment of the privacy compatibility of orbit software networks application. Experimental analysis employs the data from social datasets.\",\"PeriodicalId\":130452,\"journal\":{\"name\":\"2021 International Conference on Computing, Communication and Green Engineering (CCGE)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computing, Communication and Green Engineering (CCGE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCGE50943.2021.9776454\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGE50943.2021.9776454","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

隐私保护数据挖掘是数据挖掘方法在保护个人信息隐私方面的主要应用。数据挖掘算法搜索最有价值的信息。隐私保护数据挖掘的一个主要方面是保护敏感信息免受未经授权的访问。安全数据贡献检索算法根据应用程序的需要和兼容性分配隐私策略和安全性。该方法能够满足大量数据集的需求。目前,Facebook、Twitter、YouTube等社交媒体网站非常受欢迎。然后,扩展的基于属性的加密方法允许用户跨轨道软件网络传输数据内容。用户轨道软件网络在不安全的分布式或集中式系统中采集和存储数据时,会发生数据泄露。第三,建议的逐级安全优化和内容可视化算法有助于防止信息共享和数据可视化时的隐私问题。他们在评估轨道软件网络应用程序的隐私兼容性后,在个人层面使用隐私级别。实验分析采用来自社会数据集的数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secure Data Contribution and Retrieval in Social Networks Using Effective Privacy Preserving Data Mining Techniques
Privacy Preserving Data-Mining is the major use of data- mining methods for ensuring privacy of personal information. Data-mining algorithms search for the information that is most valuable. A major aspect of Privacy Preserving Data Mining is the safeguarding of sensitive information against unauthorized access. The Secure Data Contribution Retrieval algorithm assigns a privacy policy and security is assigned depending on the application needs and compatibility. This method is capable of meeting the requirements for numerous datasets. Currently, social media sites such as Facebook, Twitter, and YouTube are quite popular. Then, the expanded attribute-based encryption methodology allows users to transfer data contents across orbit software networks. Data leakage occurs during the gathering and storage of user Orbit Software Networks in an insecure distributed or centralized system. Third, the suggested Level by Level Security Optimization and Content Visualization algorithm helps prevent privacy problems when sharing information and visualizing data. They use privacy levels at the individual level following the assessment of the privacy compatibility of orbit software networks application. Experimental analysis employs the data from social datasets.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Stock Market Analysis using Time Series Data Analytics Techniques [Agendas] Irrigation to Smart Irrigation and Tube Well Users A Feature Cum Intensity Based SSIM Optimised Hybrid Image Registration Technique Flood Level Control and Management Using Instrumentation and Control
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1