Strategies for Sensitive Association Rule Hiding

Article Preview

Abstract:

Data mining technologies are used widely while the side effects it incurred are concerned so seriously. Privacy preserving data mining is so important for data and knowledge security during data mining applications. Association rule extracted from data mining is one kind of the most popular knowledge. It is challenging to hide sensitive association rules extracted by data mining process and make less affection on non-sensitive rules and the original database. In this work, we focus on specific association rule automatic hiding. Novel strategies are proposed which are based on increasing the support of the left hand and decreasing the support of the right hand. Quality measurements for sensitive association rules hiding are presented.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2203-2206

Citation:

Online since:

July 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] VS Verykios and A Gkoulalas-Divanis, A survey of association rule hiding methods for privacy, in Privacy Preserving Data Mining: Models and Algorithms, Springer Berlin Heidelberg, 2008, pp.267-289.

DOI: 10.1007/978-0-387-70992-5_11

Google Scholar

[2] HF Wei, BZ Wang, X Deng and AH Wu, Overview of privacy protection technology based on database application, in Applied Mechanics and Materials (Volumes 241 - 244) , December, 2012, pp.2816-2821.

DOI: 10.4028/www.scientific.net/amm.241-244.2816

Google Scholar

[3] Yogendra Kumar Jain, Vinod Kumar Yadav and Geetika S. Panday, An efficient association rule hiding algorithm for privacy preserving data mining, International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 7, July 2011, pp.2792-2798.

Google Scholar

[4] DE O'Leary, Knowledge discovery as a threat to database security, in G. Piatetsky-Shapiro and W.J. Frawley WJ (eds. ) Knowledge Discovery in Databases, Menlo Park: AAAI Press; Cambridge: MIT Press, 1991, pp.507-516.

Google Scholar

[5] C Clifton and D Marks, Security and privacy implications of data mining, in JW Han, LVS Lakshmanan and R Ng (eds. ), Proc. of the ACM SIGMOD Workshop Data Mining and Knowledge Discovery, Vancouver: University of British Columbia, 1996, pp.15-19.

Google Scholar

[6] M Atallah, E Bertino, A Elmagarmid, M Ibrahim and VS Verykios, Disclosure limitation of sensitive rules", in P Scheuermann (ed. ) Proc. of the IEEE Knowledge and Data Exchange Workshop (KDEX, 99), Chicago: IEEE Computer Society, 1999, pp.45-52.

DOI: 10.1109/kdex.1999.836532

Google Scholar

[7] R Agrawal and R Srikant, Privacy preserving data mining, SIGMOD Record, 29(2), 2000, pp.439-450.

DOI: 10.1145/335191.335438

Google Scholar

[8] Y Lindell and B Pinkas, Privacy preserving data mining, Journal of Cryptology, 15(3), 2000, pp.36-54.

DOI: 10.1007/3-540-44598-6_3

Google Scholar

[9] A Gkoulalas-Divanis and VS Verykios, Association Rule Hiding for Data Mining, Advances in Database Systems 41, Springer Science Business Media, LLC (2010).

DOI: 10.1007/978-1-4419-6569-1

Google Scholar

[10] Shyue-Liang Wang , Bhavesh Parikh, Ayat Jafari, Hiding informative association rule sets, Expert Systems with Applications 33 (2007) , pp.316-323.

DOI: 10.1016/j.eswa.2006.05.022

Google Scholar