Analysis of Privacy Preserving Approaches in High Utility Pattern Mining

被引:4
|
作者
Yun, Unil [1 ]
Kim, Donggyu [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Data mining; Utility pattern mining; High average-utility pattern mining; Stream pattern mining;
D O I
10.1007/978-981-10-3023-9_137
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the significant increase of information sharing in various areas, it has been an important issue to prevent personal information from being disclosed to abnormal users. Pattern mining is one of data mining technique for extracting interesting pattern information from massive databases. Therefore, sensitive patterns belonging to personal information can be disclosed to abnormal users through pattern mining methods. A sanitization approach that modifies a given database is one of the most common approach for achieving privacy preserving. In this paper, we introduce and analyze various methods for achieving privacy preserving in high utility pattern mining based on sanitization approaches.
引用
收藏
页码:883 / 887
页数:5
相关论文
共 50 条
  • [1] Transaction Database Modification Approaches for Achieving Privacy Preserving in High Utility Itemset Mining
    Kim, Donggyu
    Yun, Unil
    Ryang, Heungmo
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2485 - 2490
  • [2] Privacy Preserving Utility Mining: A Survey
    Gan, Wensheng
    Chun-Wei, Jerry
    Chao, Han-Chieh
    Wang, Shyue-Liang
    Yu, Philip S.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 2617 - 2626
  • [3] Privacy Preserving High Utility Mining based on Genetic Algorithms
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Wong, Jia-Wei
    Lan, Guo-Cheng
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 191 - 195
  • [4] Novel Algorithms for Privacy Preserving Utility Mining
    Yeh, Teh-Shan
    Hsu, Po-Chiang
    Wen, Ming-Hsun
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 291 - 296
  • [5] A Sanitization Approach of Privacy Preserving Utility Mining
    Lin, Jerry Chun-Wei
    Wu, Tsu-Yang
    Fournier-Viger, Philippe
    Lin, Guo
    Hong, Tzung-Pei
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 47 - 57
  • [6] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [7] Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
    Lin, Jerry Chun-Wei
    Wu, Tsu-Yang
    Fournier-Viger, Philippe
    Lin, Guo
    Zhan, Justin
    Voznak, Miroslav
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 55 : 269 - 284
  • [8] A Survey on Privacy Preserving Data Mining Approaches and Techniques
    Siraj, Maheyzah Md
    Rahmat, Nurul Adibah
    Din, Mazura Mat
    2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 65 - 69
  • [9] Learning and synchronized privacy preserving frequent pattern mining
    Guo Y.-H.
    Tong Y.-H.
    Tang S.-W.
    Wu L.-D.
    Ruan Jian Xue Bao/Journal of Software, 2011, 22 (08): : 1749 - 1760
  • [10] A Randomization Approach to Mining Sequential Pattern with Privacy Preserving
    Ouyang, Weimin
    Huang, Qinhua
    Xin, Hongliang
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, 2008, : 65 - +