Novel Algorithms for Privacy Preserving Utility Mining

被引:3
|
作者
Yeh, Teh-Shan [1 ]
Hsu, Po-Chiang [1 ]
Wen, Ming-Hsun [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
D O I
10.1109/ISDA.2008.89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the sharing process is an important issue. This study focuses on Privacy Preserving Utility Mining (PPUM) and presents two novel algorithms, HHUIF and MSICF, to achieve the goal of hiding sensitive itemsets so that the adversaries can not mine them from the modified database. In addition, we minimize the impact on the sanitized database in the process of hiding sensitive itemsets. The experimental results show that HHUIF achieves the lower miss costs than MSICF does on two synthetic datasets. On the other hand, MSICF generally has the lower difference between the original and sanitized databases than HHUIF does.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [41] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [42] Measuring Privacy and Utility in Privacy-Preserving Visualization
    Dasgupta, Aritra
    Chen, Min
    Kosara, Robert
    COMPUTER GRAPHICS FORUM, 2013, 32 (08) : 35 - 47
  • [43] Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media
    Salim, Sara
    Moustafa, Nour
    Turnbull, Benjamin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 857 - 864
  • [44] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Tung-Shou Chen
    Wei-Bin Lee
    Jeanne Chen
    Yuan-Hung Kao
    Pei-Wen Hou
    The Journal of Supercomputing, 2013, 66 : 907 - 917
  • [45] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Chen, Tung-Shou
    Lee, Wei-Bin
    Chen, Jeanne
    Kao, Yuan-Hung
    Hou, Pei-Wen
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 907 - 917
  • [46] Comprehensive Survey on Privacy Preserving Association Rule Mining: Models, Approaches, Techniques and Algorithms
    Alwatban, Ibrahim S.
    Emam, Ahmed Z.
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2014, 23 (05)
  • [47] Privacy preserving mining of association rules
    Evfimievski, A
    Srikant, R
    Agrawal, R
    Gehrke, J
    INFORMATION SYSTEMS, 2004, 29 (04) : 343 - 364
  • [48] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [49] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [50] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114