Novel Algorithms for Privacy Preserving Utility Mining

被引:3
|
作者
Yeh, Teh-Shan [1 ]
Hsu, Po-Chiang [1 ]
Wen, Ming-Hsun [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
D O I
10.1109/ISDA.2008.89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the sharing process is an important issue. This study focuses on Privacy Preserving Utility Mining (PPUM) and presents two novel algorithms, HHUIF and MSICF, to achieve the goal of hiding sensitive itemsets so that the adversaries can not mine them from the modified database. In addition, we minimize the impact on the sanitized database in the process of hiding sensitive itemsets. The experimental results show that HHUIF achieves the lower miss costs than MSICF does on two synthetic datasets. On the other hand, MSICF generally has the lower difference between the original and sanitized databases than HHUIF does.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [31] Privacy Preserving Data Mining
    Journal of Cryptology, 2002, 15 : 177 - 206
  • [32] Privacy preserving classification mining
    Department of Computing and Information Technology, Fudan University, Shanghai 200433, China
    Jisuanji Yanjiu yu Fazhan, 2006, 1 (39-45):
  • [33] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [34] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [35] Data transformation techniques for preserving privacy in distance-based mining algorithms
    Kadampur, Mohammad Ali
    Somayajulu, D. V. L. N.
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2014, 6 (03) : 285 - 311
  • [36] Privacy preserving data mining algorithms without the use of secure computation or perturbation
    Gurevich, Alex
    Gudes, Ehud
    10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
  • [37] Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction
    Li, Shaoxin
    Mu, Nankun
    Le, Junqing
    Liao, Xiaofeng
    COMPUTERS & SECURITY, 2019, 84 : 17 - 34
  • [38] A new algorithm using integer programming relaxation for privacy-preserving in utility mining
    Nguyen, Duc
    Tran, Minh-Thai
    Le, Bac
    APPLIED INTELLIGENCE, 2023, 53 (21) : 25106 - 25118
  • [39] A new algorithm using integer programming relaxation for privacy-preserving in utility mining
    Duc Nguyen
    Minh-Thai Tran
    Bac Le
    Applied Intelligence, 2023, 53 : 25106 - 25118
  • [40] Transaction Database Modification Approaches for Achieving Privacy Preserving in High Utility Itemset Mining
    Kim, Donggyu
    Yun, Unil
    Ryang, Heungmo
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2485 - 2490