BRBA: A Blocking-Based Association Rule Hiding Method

被引:0
|
作者
Cheng, Peng [1 ,2 ]
Lee, Ivan [3 ]
Li, Li [1 ]
Tseng, Kuo-Kun [2 ]
Pan, Jeng-Shyang [2 ]
机构
[1] Southwest Univ, Sch Comp & Informat Sci, Chongqing, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Harbin, Heilongjiang, Peoples R China
[3] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA, Australia
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy preserving in association rule mining is an important research topic in the database security field. This paper has proposed a blocking-based method to solve the association rule hiding problem for data sharing. It aims at reducing undesirable side effects and increasing desirable side effects, while ensuring to conceal all sensitive rules. The candidate transactions are selected for sanitization based on their relations with border rules. Comparative experiments on real datasets demonstrate that the proposed method can achieve its goals.
引用
收藏
页码:4200 / 4201
页数:2
相关论文
共 50 条
  • [41] Distortion-Based Heuristic Sensitive Rule Hiding Method - The Greedy Way
    Cheng, Peng
    Chu, Shu-Chuan
    Lin, Chun-Wei
    Roddick, John F.
    MODERN ADVANCES IN APPLIED INTELLIGENCE, IEA/AIE 2014, PT I, 2014, 8481 : 77 - 86
  • [42] CD47-SIRPα blocking-based immunotherapy: Current and prospective therapeutic strategies
    Bouwstra, Renee
    van Meerten, Tom
    Bremer, Edwin
    CLINICAL AND TRANSLATIONAL MEDICINE, 2022, 12 (08):
  • [43] A Novel Approach for Efficient Mining and Hiding of Sensitive Association Rule
    Patil, Suraj P.
    Patewar, M.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [44] Hiding sensitive items in privacy preserving association rule mining
    Wang, SL
    Lee, YH
    Billis, S
    Jafari, A
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 3239 - 3244
  • [45] An association rule hiding algorithm for privacy preserving data mining
    Srinivasa Rao, K.
    Mandhala, Venkata Naresh
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    International Journal of Control and Automation, 2014, 7 (10): : 393 - 404
  • [46] A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy
    Zhu, Jian-Ming
    Zhang, Ning
    Li, Zhan-Yu
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (SPECIALISSUE) : 41 - 50
  • [47] Privacy preservation through a greedy, distortion-based rule-hiding method
    Peng Cheng
    John F. Roddick
    Shu-Chuan Chu
    Chun-Wei Lin
    Applied Intelligence, 2016, 44 : 295 - 306
  • [48] Privacy preservation through a greedy, distortion-based rule-hiding method
    Cheng, Peng
    Roddick, John F.
    Chu, Shu-Chuan
    Lin, Chun-Wei
    APPLIED INTELLIGENCE, 2016, 44 (02) : 295 - 306
  • [49] Method for IP geolocation based on association rule mining
    School of Computer Science, Beijing University of Posts and Telecommunications, Beijing
    100876, China
    Dongnan Daxue Xuebao, 4 (657-662): : 657 - 662
  • [50] An Association Rule Based Grid Resource Discovery Method
    Lin, Yuan
    Luo, Siwei
    Lu, Guohao
    Wang, Zhe
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (04): : 913 - 916