Novel Algorithms for Privacy Preserving Utility Mining

被引:3
|
作者
Yeh, Teh-Shan [1 ]
Hsu, Po-Chiang [1 ]
Wen, Ming-Hsun [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
D O I
10.1109/ISDA.2008.89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the sharing process is an important issue. This study focuses on Privacy Preserving Utility Mining (PPUM) and presents two novel algorithms, HHUIF and MSICF, to achieve the goal of hiding sensitive itemsets so that the adversaries can not mine them from the modified database. In addition, we minimize the impact on the sanitized database in the process of hiding sensitive itemsets. The experimental results show that HHUIF achieves the lower miss costs than MSICF does on two synthetic datasets. On the other hand, MSICF generally has the lower difference between the original and sanitized databases than HHUIF does.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [11] On association rules mining algorithms with data privacy preserving
    Gorawski, M
    Stachurski, K
    ADVANCES IN WEB INTELLIGENCE, PROCEEDINGS, 2005, 3528 : 170 - 175
  • [12] A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
    Elisa Bertino
    Igor Nai Fovino
    Loredana Parasiliti Provenza
    Data Mining and Knowledge Discovery, 2005, 11 : 121 - 154
  • [13] Classification Algorithms for Privacy Preserving in Data Mining: A Survey
    Ji, Sai
    Wang, Zhen
    Liu, Qi
    Liu, Xiaodong
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 312 - 322
  • [14] Privacy preserving data mining algorithms by data distortion
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Wang Yun-feng
    Chu Chao-Hsien
    PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 223 - 228
  • [15] A framework for evaluating privacy preserving data mining algorithms
    Bertino, E
    Fovino, IN
    Provenza, LP
    DATA MINING AND KNOWLEDGE DISCOVERY, 2005, 11 (02) : 121 - 154
  • [16] Analysis of Privacy Preserving Approaches in High Utility Pattern Mining
    Yun, Unil
    Kim, Donggyu
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 883 - 887
  • [17] An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining
    Liu, Xuan
    Chen, Genlang
    Wen, Shiting
    Song, Guanghui
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [18] Privacy-preserving algorithms for distributed mining of frequent itemsets
    Zhong, Sheng
    INFORMATION SCIENCES, 2007, 177 (02) : 490 - 503
  • [19] Evaluation of encryption algorithms for privacy preserving association rules mining
    El-Sisi, Ashraf B.
    Mousa, Hamdy M.
    International Journal of Network Security, 2012, 14 (05) : 289 - 296
  • [20] A novel technique of Privacy Preserving Association Rule Mining
    Mohammed, Rana Saad
    Hussien, Enas Mohammed
    Mutter, Jinan Redha
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,