Identify Risky Elements to Reduce Side Effects in Association Rule Hiding

被引:0
|
作者
Cheng, Peng [1 ]
机构
[1] Southwest Univ, Coll Comp & Informat Sci, Chongqing, Peoples R China
关键词
association rule hiding; knowledge hiding; privacy preserving data mining; SANITIZATION; DISTORTION;
D O I
10.1145/3583780.3615259
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data sharing is necessary for many practical applications. People do, however, frequently worry about the problem of privacy leaking. This study focuses on preventing the disclosure of sensitive information using association rules and frequent itemsets, which are frequently utilized in numerous applications. How to minimize side effects while hiding, particularly side effects on non-sensitive knowledge, is the difficult part of the problem. The majority of association rule hiding techniques currently in use solely consider reducing side effects on frequent itemsets (patterns), rather than rules, in order to conceal sensitive rules by reducing the statistical disclosure of the itemsets that generate such rules. In this study, we provide a concealment technique utilizing potentially risky rules to lessen adverse impacts on non-sensitive rules, not only itemsets. In addition, this method can be tailored to conceal sensitive itemsets, instead of rules. Extensive experiments show that in most cases the proposed solution can bring fewer side effects on rules, frequent patterns or data quality than existing methods.
引用
收藏
页码:3813 / 3817
页数:5
相关论文
共 50 条
  • [21] Sensitive association rule hiding based on an FP-tree
    Xie, Zhi-Qiang
    Zhu, Meng-Jie
    Yang, Jing
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (10): : 1134 - 1140
  • [22] Efficient algorithms for distortion and blocking techniques in association rule hiding
    Vassilios S. Verykios
    Emmanuel D. Pontikakis
    Yannis Theodoridis
    Liwu Chang
    Distributed and Parallel Databases, 2007, 22 : 85 - 104
  • [23] Efficient algorithms for distortion and blocking techniques in association rule hiding
    Verykios, Vassilios S.
    Pontikakis, Emmanuel D.
    Theodoridis, Yannis
    Chang, Liwu
    DISTRIBUTED AND PARALLEL DATABASES, 2007, 22 (01) : 85 - 104
  • [24] BRBA: A Blocking-Based Association Rule Hiding Method
    Cheng, Peng
    Lee, Ivan
    Li, Li
    Tseng, Kuo-Kun
    Pan, Jeng-Shyang
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 4200 - 4201
  • [25] Hiding sensitive itemsets without side effects
    Surendra, H.
    Mohan, H. S.
    APPLIED INTELLIGENCE, 2019, 49 (04) : 1213 - 1227
  • [26] Hiding sensitive knowledge without side effects
    Aris Gkoulalas-Divanis
    Vassilios S. Verykios
    Knowledge and Information Systems, 2009, 20 : 263 - 299
  • [27] Hiding sensitive items in privacy preserving association rule mining
    Wang, SL
    Lee, YH
    Billis, S
    Jafari, A
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 3239 - 3244
  • [28] An association rule hiding algorithm for privacy preserving data mining
    Srinivasa Rao, K.
    Mandhala, Venkata Naresh
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    International Journal of Control and Automation, 2014, 7 (10): : 393 - 404
  • [29] Hiding sensitive knowledge without side effects
    Gkoulalas-Divanis, Aris
    Verykios, Vassilios S.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 20 (03) : 263 - 299
  • [30] Hiding sensitive itemsets without side effects
    Surendra H
    Mohan H S
    Applied Intelligence, 2019, 49 : 1213 - 1227