Hiding sensitive knowledge without side effects

被引:0
|
作者
Aris Gkoulalas-Divanis
Vassilios S. Verykios
机构
[1] University of Thessaly,Department of Computer and Communication Engineering
来源
关键词
Data mining; Association rule hiding; Borders of frequent itemsets; Parallelization;
D O I
暂无
中图分类号
学科分类号
摘要
Sensitive knowledge hiding in large transactional databases is one of the major goals of privacy preserving data mining. However, it is only recently that researchers were able to identify exact solutions for the hiding of knowledge, depicted in the form of sensitive frequent itemsets and their related association rules. Exact solutions allow for the hiding of vulnerable knowledge without any critical compromises, such as the hiding of nonsensitive patterns or the accidental uncovering of infrequent itemsets, amongst the frequent ones, in the sanitized outcome. In this paper, we highlight the process of border revision, which plays a significant role towards the identification of exact hiding solutions, and we provide efficient algorithms for the computation of the revised borders. Furthermore, we review two algorithms that identify exact hiding solutions, and we extend the functionality of one of them to effectively identify exact solutions for a wider range of problems (than its original counterpart). Following that, we introduce a novel framework for decomposition and parallel solving of hiding problems, which are handled by each of these approaches. This framework improves to a substantial degree the size of the problems that both algorithms can handle and significantly decreases their runtime. Through experimentation, we demonstrate the effectiveness of these approaches toward providing high quality knowledge hiding solutions.
引用
收藏
页码:263 / 299
页数:36
相关论文
共 50 条
  • [1] Hiding sensitive knowledge without side effects
    Gkoulalas-Divanis, Aris
    Verykios, Vassilios S.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 20 (03) : 263 - 299
  • [2] Hiding sensitive itemsets without side effects
    Surendra, H.
    Mohan, H. S.
    APPLIED INTELLIGENCE, 2019, 49 (04) : 1213 - 1227
  • [3] Hiding sensitive itemsets without side effects
    Surendra H
    Mohan H S
    Applied Intelligence, 2019, 49 : 1213 - 1227
  • [4] Hiding sensitive association rules with limited side effects
    Wu, Yi-Hung
    Chiang, Chia-Ming
    Chen, Arbee L. P.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (01) : 29 - 42
  • [5] Graph based Hiding of Sensitive Knowledge
    Krasadakis, Panteleimon
    Futia, Giuseppe
    Verykios, Vassilios S.
    Sakkopoulos, Evangelos
    2023 IEEE 35TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, 2023, : 199 - 203
  • [6] Parallel based Hiding of Sensitive Knowledge
    Krasadakis, Panteleimon
    Verykios, Vassilios S.
    Sakkopoulos, Evangelos
    2020 IEEE 32ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2020, : 1249 - 1254
  • [7] Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Hsu, Hung-Chuan
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [8] Reversible Data Hiding Without Side Information
    Yoo, Hyang-Mi
    Lee, Sang-Kwang
    Seo, Bo-Seok
    Suh, Jae-Won
    2012 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2012, : 192 - 195
  • [9] Solving the Sensitive Itemset Hiding Problem Whilst Minimizing Side Effects on a Sanitized Database
    Lee, Guanling
    Chen, Yi-Chun
    Peng, Sheng-Lung
    Lin, Jyun-Hao
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2011, 223 : 104 - 113
  • [10] Knowledge hiding as the dark side of competitive psychological climate
    Han, Myat Su
    Masood, Khola
    Cudjoe, Dan
    Wang, Yonggui
    LEADERSHIP & ORGANIZATION DEVELOPMENT JOURNAL, 2021, 42 (02) : 195 - 207