4) DECISION MAKER
As shown in Fig. 2, a decision maker can get the data mining
results directly from the data miner, or from some Informa-
tion Transmitter. It is likely that the information transmitter
changes the mining results intentionally or unintentionally,
which may cause serious loss to the decision maker. Therefore,
what the decision maker concerns is whether the mining
results are credible.
In addition to investigate the privacy-protection approaches
adopted by each user role, in this paper we emphasize a common
type of approach, namely game theoretical approach,
that can be applied to many problems involving privacy protection
in data mining. The rationality is that, in the data
mining scenario, each user pursues high self-interests in terms
of privacy preservation or data utility, and the interests of
different users are correlated. Hence the interactions among
different users can be modeled as a game. By using methodologies
from game theory [8], we can get useful implications
on how each user role should behavior in an attempt to solve
his privacy problems.
4) DECISION MAKERAs shown in Fig. 2, a decision maker can get the data miningresults directly from the data miner, or from some Informa-tion Transmitter. It is likely that the information transmitterchanges the mining results intentionally or unintentionally,which may cause serious loss to the decision maker. Therefore,what the decision maker concerns is whether the miningresults are credible.In addition to investigate the privacy-protection approachesadopted by each user role, in this paper we emphasize a commontype of approach, namely game theoretical approach,that can be applied to many problems involving privacy protectionin data mining. The rationality is that, in the datamining scenario, each user pursues high self-interests in termsof privacy preservation or data utility, and the interests ofdifferent users are correlated. Hence the interactions amongdifferent users can be modeled as a game. By using methodologiesfrom game theory [8], we can get useful implicationson how each user role should behavior in an attempt to solvehis privacy problems.
การแปล กรุณารอสักครู่..
