Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases

被引:0
|
作者
Chandrasekharan, Iyer [1 ]
Baruah, P. K. [1 ]
Mukkamala, Ravi [2 ]
机构
[1] Sri Sathya Sai Inst Higher Learning, Dept Math & Comp Sci, Prashanti Nilayam, Andhra Pradesh, India
[2] Old Dominion Univ, Dept Comp Sci, Norfolk, VA 23529 USA
关键词
Data mining; Frequent itemsets; Outsourcing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has ushered a new interest in a paradigm called Datamining-as-a-service. This paradigm is aimed at organizations that lack the technical expertise or the computational resources enabling them to outsource their data mining tasks to a third party service provider. One of the main issues in this regard is the confidentiality of the valuable data at the server which the data owner considers as private. In this work, we study the problem of privacy preserving frequent itemset mining in outsourced transaction databases. We propose a novel hybrid method to achieve k-support anonymity based on statistical observations on the datasets. Our comprehensive experiments on real as well as synthetic datasets show that our techniques are effective and provide moderate privacy.
引用
收藏
页码:787 / 793
页数:7
相关论文
共 50 条
  • [31] CFM: Collusion-free model of privacy preserving frequent itemset mining
    Sekhavat Y.A.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 249 - 267
  • [32] Privacy preserving rare itemset mining
    Gui, Yijie
    Gan, Wensheng
    Wu, Yongdong
    Yu, Philip S.
    INFORMATION SCIENCES, 2024, 662
  • [33] Probabilistic Frequent Itemset Mining in Uncertain Databases
    Bernecker, Thomas
    Kriegel, Hans-Peter
    Renz, Matthias
    Verhein, Florian
    Zuefle, Andreas
    KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 119 - 127
  • [34] Privacy-preserving mining of frequent routes in cellular network data
    Gornerup, Olof
    Dokoohaki, Nima
    Hess, Andrea
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 581 - 587
  • [35] An improved EMASK algorithm for privacy-preserving frequent pattern mining
    Xu, CF
    Wang, JL
    Dan, HW
    Pan, YH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 752 - 757
  • [36] An Efficient Algorithm for Frequent Pattern Mining based on Privacy-preserving
    Zhang, Yaling
    Wang, Ting
    Wang, Shangping
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [37] A privacy-preserving mining algorithm of association rules in distributed databases
    Liu, Jie
    Piao, Xiufeng
    Huang, Shaobin
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 746 - +
  • [38] Frequent Itemset Mining on Correlated Probabilistic Databases
    Kalaz, Yasemin Asan
    Raman, Rajeev
    DATABASE AND EXPERT SYSTEMS APPLICATIONS (DEXA 2018), PT II, 2018, 11030 : 84 - 98
  • [39] Transaction Database Modification Approaches for Achieving Privacy Preserving in High Utility Itemset Mining
    Kim, Donggyu
    Yun, Unil
    Ryang, Heungmo
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2485 - 2490
  • [40] Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
    Li, Lichun
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    Datta, Anwitaman
    Shao, Jun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1847 - 1861