Font Size: a A A

Privacy Data Mining And Preserving Methods Research On Context-Awareness Service

Posted on:2011-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:G LiFull Text:PDF
GTID:2189360308961018Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Context-Awareness Service (CAS) is a very significant character of Ambient Ubiquitous Network, with a very bright future in long-term development. In the process of CAS, with the users'permissions, through sensors, handsets, mobile network and other context-awareness equipments, CAS could pick up information in non-user-initiative way, which is the spirit of CAS. With the cooperation of mobile network and database, CAS could supply a series service or service information in foresight and unconscious.With Technology Acceptance Model (TAM), it is proved in the dissertation, which the perceived risk from privacy breach has great influence on the future development of CAS; and with the technology of data mining and Mechanism Design Theory, I creatively describe privacy breach and figure out a solution to limit the breach of privacy.1) Technology acceptance model based on CASBased on the structure of technology acceptance model, combined with characters of CAS, it is added the usability, compatibility, self-efficacy, perceived risk and cost factors to the revised model, which makes the more suitable for CAS. In the empirical study, considering Location-based service as a typical service of CAS, through the questionnaires, we collect users'data. With structural equation modeling, I analyze the data and test hypothesizes of the model.2) Privacy breach limit methods in the data mining of CASFrom the point of data mining technology, the dissertation figures out the definition of privacy breach in the data mining of CAS, and give a solution to privacy breach limit. With revelation method in mechanism design theory, the dissertation discusses the solution which could realize users'utility maximization under the limitation of privacy breach.
Keywords/Search Tags:context awareness, technology acceptance model, privacy preserving data mining, mechanism design theory
PDF Full Text Request
Related items