Association Rule Hiding in Privacy Preserving Data Mining

Author:

Mohan S. Vijayarani1,Angamuthu Tamilarasi2

Affiliation:

1. Department of Computer Science, Bharathiar University, Coimbatore, India

2. Department of MCA, Kongu Engineering College, Erode, India

Abstract

This article describes how privacy preserving data mining has become one of the most important and interesting research directions in data mining. With the help of data mining techniques, people can extract hidden information and discover patterns and relationships between the data items. In most of the situations, the extracted knowledge contains sensitive information about individuals and organizations. Moreover, this sensitive information can be misused for various purposes which violate the individual's privacy. Association rules frequently predetermine significant target marketing information about a business. Significant association rules provide knowledge to the data miner as they effectively summarize the data, while uncovering any hidden relations among items that hold in the data. Association rule hiding techniques are used for protecting the knowledge extracted by the sensitive association rules during the process of association rule mining. Association rule hiding refers to the process of modifying the original database in such a way that certain sensitive association rules disappear without seriously affecting the data and the non-sensitive rules. In this article, two new hiding techniques are proposed namely hiding technique based on genetic algorithm (HGA) and dummy items creation (DIC) technique. Hiding technique based on genetic algorithm is used for hiding sensitive association rules and the dummy items creation technique hides the sensitive rules as well as it creates dummy items for the modified sensitive items. Experimental results show the performance of the proposed techniques.

Publisher

IGI Global

Subject

Information Systems

Reference29 articles.

1. On the design and quantification of privacy preserving data mining algorithms

2. Mining association rules between sets of items in large databases

3. Privacy-preserving data mining

4. Arun, K. Pujari, (2001), Data Mining Techniques. India: University Press (India) private Ltd.

5. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., & Verykios, V. S. (1999). Disclosure limitation of sensitive rules. In 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) Proceedings. (pp. 45-52). IEEE.

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Association rule hiding using enhanced elephant herding optimization algorithm;Automatika;2023-11-29

2. A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm;International Journal of Information and Computer Security;2023

3. Determination of Avalanche Effect to Compute the Efficiency of Association Rule Hiding Algorithms;Artificial Intelligence and Sustainable Computing;2022

4. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges;Sustainability;2020-12-17

5. Survey on Association Rule Hiding Techniques;International Journal of Scientific Research in Science, Engineering and Technology;2019-05-21

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3