A cost-efficient and versatile sanitizing algorithm by using a greedy approach

被引:5
|
作者
Wu, Chieh-Ming [2 ]
Huang, Yin-Fu [1 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Comp Sci & Informat Engn, Touliu 640, Yunlin, Taiwan
[2] Natl Yunlin Univ Sci & Technol, Grad Sch Engn Sci & Technol, Touliu 640, Yunlin, Taiwan
关键词
Greedy methods; FCET; Maximal itemsets; Sanitizing procedure; Exposed procedure; Rule hiding;
D O I
10.1007/s00500-010-0549-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a very large database, there exists sensitive information that must be protected against unauthorized accesses. The confidentiality protection of the information has been a long-term goal pursued by the database security research community and the government statistical agencies. In this paper, we proposed greedy methods for hiding sensitive rules. The experimental results showed the effectiveness of our approaches in terms of undesired side effects avoided in the rule hiding process. The results also revealed that in most cases, all the sensitive rules are hidden without generating spurious rules. First, the good scalability of our approach in terms of database sizes was achieved by using an efficient data structure, FCET, to store only maximal frequent itemsets instead of storing all frequent itemsets. Furthermore, we also proposed a new framework for enforcing the privacy in mining association rules. In the framework, we combined the techniques of efficiently hiding sensitive rules with the transaction retrieval engine based on the FCET index tree. For hiding sensitive rules, the proposed greedy approach includes a greedy approximation algorithm and a greedy exhausted algorithm to sanitize the database. In particular, we presented four strategies in the sanitizing procedure and four strategies in the exposed procedure, respectively, for hiding a group of association rules characterized as sensitive or artificial rules. In addition, the exposed procedure would expose missing rules during the processing so that the number of missing rules could be lowered as much as possible.
引用
收藏
页码:939 / 952
页数:14
相关论文
共 50 条
  • [1] A cost-efficient and versatile sanitizing algorithm by using a greedy approach
    Chieh-Ming Wu
    Yin-Fu Huang
    Soft Computing, 2011, 15 : 939 - 952
  • [2] Cost-efficient Divisible Load Scheduling using Genetic Algorithm
    Xuan, Hejun
    Wang, Yuping
    Hao, Shanshan
    Wang, Xiaoli
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 14 - 17
  • [3] A cost-efficient IoT service placement approach using whale optimization algorithm in fog computing environment
    Ghobaei-Arani, Mostafa
    Shahidinejad, Ali
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 200
  • [4] Multilayer approach to cost-efficient home automation
    Bozic, Milivoj
    Golan, Giora
    Mrazovac, Bojan
    Papp, Istvan
    Bjelica, Milan Z.
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - CHINA, 2014,
  • [5] A Cost-efficient Approach to Building in Continuous Integration
    Jin, Xianhao
    Servant, Francisco
    2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 13 - 25
  • [6] THE NEED FOR HBV GENOTYPING: A COST-EFFICIENT APPROACH
    Luca, A. S.
    Ursu, Ramona Gabriela
    Teusan, Teodora
    Luca, Catalina Mihaela
    Plesca, Claudia Elena
    Iancu, Luminita Smaranda
    MEDICAL-SURGICAL JOURNAL-REVISTA MEDICO-CHIRURGICALA, 2015, 119 (04): : 982 - 987
  • [7] CAROTID ENDARTERECTOMY - A SAFE COST-EFFICIENT APPROACH
    COLLIER, PE
    GIANGOLA, G
    HILL, J
    BRIGHAM, RA
    ORECCHIA, PM
    RICOTTA, JJ
    ODONNELL, TI
    JARRETT, F
    JOURNAL OF VASCULAR SURGERY, 1992, 16 (06) : 926 - 933
  • [8] Cost-Efficient VM Configuration Algorithm in the Cloud using Mix Scaling Strategy
    Lu, Li
    Yu, Jiadi
    Zhu, Yanmin
    Xue, Guangtao
    Qian, Shiyou
    Li, Minglu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [9] A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts
    Weiwei Sun
    Weibin Shi
    Bole Shi
    Yijun Yu
    Wireless Networks, 2003, 9 : 239 - 247
  • [10] A cost-efficient scheduling algorithm of on-demand broadcasts
    Sun, WW
    Shi, WB
    Shi, BL
    Yu, YJ
    WIRELESS NETWORKS, 2003, 9 (03) : 239 - 247