Hiding sensitive items in privacy preserving association rule mining

被引:5
|
作者
Wang, SL [1 ]
Lee, YH [1 ]
Billis, S [1 ]
Jafari, A [1 ]
机构
[1] New York Inst Technol, Dept Comp Sci, New York, NY USA
关键词
privacy preserving data mining; association rule;
D O I
10.1109/ICSMC.2004.1400839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving data mining [3] has recently emerged to address one of the negative sides of data mining technology: the threat to individual privacy. For example, through data mining, one is able to infer sensitive information, including personal information or even patterns, from non-sensitive information or unclassified data. There have been two broad approaches for privacy-preserving data mining. The first approach is to alter the data before delivery to the data miner so that real values are obscured. The second approach assumes the data is distributed between two or more sites, and these sites cooperate to learn the global data mining results without revealing the data at their individual sites. Given specific rules to be hidden, many data altering techniques for hiding association, classification and clustering rules have been proposed. However, to specify hidden rules, entire data mining process needs to be executed. For some applications, we are only interested in hiding certain sensitive items. In this work, we assume that only sensitive items are given and propose two algorithms to modify data in database so that sensitive items cannot be inferred through association rules mining algorithms. Examples illustrating the proposed algorithins are given. The efficiency of the proposed approach is further compared with Dasseni etc's [9] approach. It is shown that our approach required less number of databases scanning and prune more number of hidden rules. However, our approach Must hide all rules containing the hidden items on the right hand side, where Dasseni's approach can hide specific rules.
引用
收藏
页码:3239 / 3244
页数:6
相关论文
共 50 条
  • [21] Preserving privacy in association rule mining with bloom filters
    Qiu, Ling
    Li, Yingjiu
    Wu, Xintao
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2007, 29 (03) : 253 - 278
  • [22] Privacy-preserving collaborative association rule mining
    Zhan, J
    Matwin, S
    Japkowicz, N
    Chang, LW
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1172 - 1178
  • [23] Privacy-preserving collaborative association rule mining
    Zhan, J
    Matwin, S
    Chang, LW
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 153 - 165
  • [24] Privacy preserving association rule mining with scalar product
    Huang, YQ
    Lu, ZD
    Hu, HP
    PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND KNOWLEDGE ENGINEERING (IEEE NLP-KE'05), 2005, : 750 - 755
  • [25] Privacy-preserving collaborative association rule mining
    Zhan, Justin
    Matwin, Stan
    Chang, LiWu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 1216 - 1227
  • [26] Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy
    Modak, Masooda
    Shaikhb, Rizwana
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 993 - 1000
  • [27] Privacy-preserving association rule mining: a survey of techniques for sensitive rule identification and enhanced data protection
    Barua E.
    Dutta M.
    International Journal of Computers and Applications, 2024, 46 (04) : 252 - 265
  • [28] A Novel Approach for Efficient Mining and Hiding of Sensitive Association Rule
    Patil, Suraj P.
    Patewar, M.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [29] Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics
    Zhang, Lili
    Wang, Wenjie
    Zhang, Yuqing
    IEEE ACCESS, 2019, 7 : 45032 - 45047
  • [30] Parallel Privacy Preserving Association rule mining on pc Clusters
    Ramaiah, B. Janaki
    Reddy, A. Rama Mohan
    Kumari, M. Kamala
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1538 - +