Hiding sensitive items in privacy preserving association rule mining

被引:5
|
作者
Wang, SL [1 ]
Lee, YH [1 ]
Billis, S [1 ]
Jafari, A [1 ]
机构
[1] New York Inst Technol, Dept Comp Sci, New York, NY USA
关键词
privacy preserving data mining; association rule;
D O I
10.1109/ICSMC.2004.1400839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving data mining [3] has recently emerged to address one of the negative sides of data mining technology: the threat to individual privacy. For example, through data mining, one is able to infer sensitive information, including personal information or even patterns, from non-sensitive information or unclassified data. There have been two broad approaches for privacy-preserving data mining. The first approach is to alter the data before delivery to the data miner so that real values are obscured. The second approach assumes the data is distributed between two or more sites, and these sites cooperate to learn the global data mining results without revealing the data at their individual sites. Given specific rules to be hidden, many data altering techniques for hiding association, classification and clustering rules have been proposed. However, to specify hidden rules, entire data mining process needs to be executed. For some applications, we are only interested in hiding certain sensitive items. In this work, we assume that only sensitive items are given and propose two algorithms to modify data in database so that sensitive items cannot be inferred through association rules mining algorithms. Examples illustrating the proposed algorithins are given. The efficiency of the proposed approach is further compared with Dasseni etc's [9] approach. It is shown that our approach required less number of databases scanning and prune more number of hidden rules. However, our approach Must hide all rules containing the hidden items on the right hand side, where Dasseni's approach can hide specific rules.
引用
收藏
页码:3239 / 3244
页数:6
相关论文
共 50 条
  • [1] Sensitive Items in Privacy Preserving - Association Rule Mining
    Duraiswamy, K.
    Maheswari, N.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2008, 7 (01) : 31 - 35
  • [2] Association Rule Hiding for Privacy Preserving Data Mining
    Mogtaba, Shyma
    Kambal, Eiman
    [J]. ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2016, 9728 : 320 - 333
  • [3] Association Rule Hiding in Privacy Preserving Data Mining
    Mohan, S. Vijayarani
    Angamuthu, Tamilarasi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (03) : 141 - 163
  • [4] An association rule hiding algorithm for privacy preserving data mining
    Srinivasa Rao, K.
    Mandhala, Venkata Naresh
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    [J]. International Journal of Control and Automation, 2014, 7 (10): : 393 - 404
  • [5] Detection of Sensitive Items in Market Basket Database using Association Rule Mining for Privacy Preserving
    Kasthuri, S.
    Meyyappan, T.
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [6] Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study
    Gayathiri, P.
    Poorna, B.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 236 - 242
  • [7] Efficient method in association rule hiding for privacy preserving with data mining approach
    Praveena K.
    Sirisha G.
    Babu S.S.
    Rao P.S.
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (01): : 47 - 50
  • [8] Privacy preserving association rule mining
    Saygin, Y
    Verykios, VS
    Elmagarmid, AK
    [J]. TWELFTH INTERNATIONAL WORKSHOP ON RESEARCH ISSUES IN DATA ENGINEERING: ENGINEERING E-COMMERCE/E-BUSINESS SYSTEMS, 2002, : 151 - 158
  • [9] Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy
    Zhu, Jianming
    Li, Zhanyu
    [J]. LISS 2013, 2015, : 1065 - 1070
  • [10] A Survey on Privacy Preserving Association Rule Mining
    Zhang, Lili
    Niu, Danmei
    Li, Yuxiang
    Zhang, Zhiyong
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 93 - 97