Novel Algorithms for Privacy Preserving Utility Mining

被引:3
|
作者
Yeh, Teh-Shan [1 ]
Hsu, Po-Chiang [1 ]
Wen, Ming-Hsun [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
D O I
10.1109/ISDA.2008.89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the sharing process is an important issue. This study focuses on Privacy Preserving Utility Mining (PPUM) and presents two novel algorithms, HHUIF and MSICF, to achieve the goal of hiding sensitive itemsets so that the adversaries can not mine them from the modified database. In addition, we minimize the impact on the sanitized database in the process of hiding sensitive itemsets. The experimental results show that HHUIF achieves the lower miss costs than MSICF does on two synthetic datasets. On the other hand, MSICF generally has the lower difference between the original and sanitized databases than HHUIF does.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [1] Novel stochastic algorithms for privacy-preserving utility mining
    Nguyen, Duc
    Le, Bac
    APPLIED INTELLIGENCE, 2024, 54 (24) : 12725 - 12741
  • [2] HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
    Yeh, Jieh-Shan
    Hsu, Po-Chiang
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (07) : 4779 - 4786
  • [3] Privacy Preserving High Utility Mining based on Genetic Algorithms
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Wong, Jia-Wei
    Lan, Guo-Cheng
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 191 - 195
  • [4] Privacy Preserving Utility Mining: A Survey
    Gan, Wensheng
    Chun-Wei, Jerry
    Chao, Han-Chieh
    Wang, Shyue-Liang
    Yu, Philip S.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 2617 - 2626
  • [5] Efficient algorithms for victim item selection in privacy-preserving utility mining
    Jangra, Shalini
    Toshniwal, Durga
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 219 - 234
  • [6] Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
    Lin, Jerry Chun-Wei
    Wu, Tsu-Yang
    Fournier-Viger, Philippe
    Lin, Guo
    Zhan, Justin
    Voznak, Miroslav
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 55 : 269 - 284
  • [7] A Sanitization Approach of Privacy Preserving Utility Mining
    Lin, Jerry Chun-Wei
    Wu, Tsu-Yang
    Fournier-Viger, Philippe
    Lin, Guo
    Hong, Tzung-Pei
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 47 - 57
  • [8] A novel algorithm for privacy preserving utility mining based on integer linear programming
    Li, Shaoxin
    Mu, Nankun
    Le, Junqing
    Liao, Xiaofeng
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 81 : 300 - 312
  • [9] A novel method for privacy preserving in association rule mining based on genetic algorithms
    Dehkordi, Mohammad Naderi
    Badie, Kambiz
    Zadeh, Ahmad Khadem
    Journal of Software, 2009, 4 (06) : 555 - 562
  • [10] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120