Identify Risky Elements to Reduce Side Effects in Association Rule Hiding

被引:0
|
作者
Cheng, Peng [1 ]
机构
[1] Southwest Univ, Coll Comp & Informat Sci, Chongqing, Peoples R China
关键词
association rule hiding; knowledge hiding; privacy preserving data mining; SANITIZATION; DISTORTION;
D O I
10.1145/3583780.3615259
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data sharing is necessary for many practical applications. People do, however, frequently worry about the problem of privacy leaking. This study focuses on preventing the disclosure of sensitive information using association rules and frequent itemsets, which are frequently utilized in numerous applications. How to minimize side effects while hiding, particularly side effects on non-sensitive knowledge, is the difficult part of the problem. The majority of association rule hiding techniques currently in use solely consider reducing side effects on frequent itemsets (patterns), rather than rules, in order to conceal sensitive rules by reducing the statistical disclosure of the itemsets that generate such rules. In this study, we provide a concealment technique utilizing potentially risky rules to lessen adverse impacts on non-sensitive rules, not only itemsets. In addition, this method can be tailored to conceal sensitive itemsets, instead of rules. Extensive experiments show that in most cases the proposed solution can bring fewer side effects on rules, frequent patterns or data quality than existing methods.
引用
收藏
页码:3813 / 3817
页数:5
相关论文
共 50 条
  • [1] Association rule hiding
    Verykios, VS
    Elmagarmid, AK
    Bertino, E
    Saygin, Y
    Dasseni, E
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (04) : 434 - 447
  • [2] Hiding sensitive association rules with limited side effects
    Wu, Yi-Hung
    Chiang, Chia-Ming
    Chen, Arbee L. P.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (01) : 29 - 42
  • [3] Association rule hiding methods
    Verykios, Vassilios S.
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2013, 3 (01) : 28 - 36
  • [4] A Survey of Association Rule Hiding Algorithms
    Garg, Vikram
    Singh, Anju
    Singh, Divakar
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 404 - 407
  • [5] Strategies for Sensitive Association Rule Hiding
    Wang, Hui
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2203 - 2206
  • [6] Hiding informative association rule sets
    Wang, Shyue-Liang
    Parikh, Bhavesh
    Jafarl, Ayat
    EXPERT SYSTEMS WITH APPLICATIONS, 2007, 33 (02) : 316 - 323
  • [7] Association rule: from Mining to Hiding
    Wang, Hui
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2570 - 2573
  • [8] Association Rule Hiding Based on Intersection Lattice
    Le, Hai Quoc
    Arch-int, Somjit
    Arch-int, Ngamnij
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [9] New Approach for Sensitive Association Rule Hiding
    Zhang, Xiaoming
    Qiao, Xi
    2008 INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND TRAINING AND 2008 INTERNATIONAL WORKSHOP ON GEOSCIENCE AND REMOTE SENSING, VOL 2, PROCEEDINGS,, 2009, : 710 - 714
  • [10] Information driven association rule hiding algorithms
    Fovino, Igor Nai
    Trombetta, Alberto
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 383 - +