Novel Algorithms for Privacy Preserving Utility Mining

被引:3
|
作者
Yeh, Teh-Shan [1 ]
Hsu, Po-Chiang [1 ]
Wen, Ming-Hsun [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
D O I
10.1109/ISDA.2008.89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the sharing process is an important issue. This study focuses on Privacy Preserving Utility Mining (PPUM) and presents two novel algorithms, HHUIF and MSICF, to achieve the goal of hiding sensitive itemsets so that the adversaries can not mine them from the modified database. In addition, we minimize the impact on the sanitized database in the process of hiding sensitive itemsets. The experimental results show that HHUIF achieves the lower miss costs than MSICF does on two synthetic datasets. On the other hand, MSICF generally has the lower difference between the original and sanitized databases than HHUIF does.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [21] A Novel Approach for Horizontal Privacy Preserving Data Mining
    Jalla, Hanumantha Rao
    Girija, P. N.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016, 2016, 434 : 101 - 111
  • [22] Utility independent privacy preserving data mining -horizontally partitioned data
    Poovammal E.
    Ponnavaikko M.
    Data Science Journal, 2010, 9 : 62 - 72
  • [23] Efficient privacy preserving algorithms for hiding sensitive high utility itemsets
    Ashraf, Mohamed
    Rady, Sherine
    Abdelkader, Tamer
    Gharib, Tarek F.
    COMPUTERS & SECURITY, 2023, 132
  • [24] Efficient Apriori Based Algorithms for Privacy Preserving Frequent Itemset Mining
    Csiszarik, Adrian
    Lestyan, Szilvia
    Lukacs, Andras
    2014 5TH IEEE CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2014, : 431 - 435
  • [25] Fast privacy-preserving utility mining algorithm based on utility-list dictionary
    Chunyong Yin
    Ying Li
    Applied Intelligence, 2023, 53 : 29363 - 29377
  • [26] Fast privacy-preserving utility mining algorithm based on utility-list dictionary
    Yin, Chunyong
    Li, Ying
    APPLIED INTELLIGENCE, 2023, 53 (23) : 29363 - 29377
  • [27] A fast perturbation algorithm using tree structure for privacy preserving utility mining
    Yun, Unil
    Kim, Jiwon
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (03) : 1149 - 1165
  • [28] Utility Promises of Self-Organising Maps in Privacy Preserving Data Mining
    Mohammed, Kabiru
    Ayesh, Aladdin
    Boiten, Eerke
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 55 - 72
  • [29] A NOVEL PRIVACY-PRESERVING ASSOCIATION RULES MINING METHOD
    Tian Hong
    Wang Xiukun
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2010, 24 (06) : 995 - 1009
  • [30] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206