Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Hiding Sensitive Itemsets with Minimal Side Effects in Privacy Preserving Data Mining

  • Conference paper
Intelligent Data analysis and its Applications, Volume I

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 297))

Abstract

Privacy-preserving data mining (PPDM) has become an important issue to hide the confidential or private data before it is shared or published in recent years. In this paper, a novel algorithm is proposed to hide sensitive itemsets through item deletion. Three side effects of hiding failures, missing itemsets, and artificial itemsets are considered to evaluate whether the transactions or the itemsets are required to be deleted for hiding sensitive itemsets. Experiments are then conducted to show the performance of the proposed algorithm in execution time, number of deleted transactions, and number of side effects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Agrawal, R., Imielinski, T., Swami, A.: Database mining: A performance perspective. IEEE Transactions on Knowledge and Data Engineering 5, 914–925 (1993)

    Article  Google Scholar 

  2. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: The International Conference on Very Large Data Bases, pp. 487–499 (1994)

    Google Scholar 

  3. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: The Workshop on Knowledge and Data Engineering Exchange, pp. 45–52 (1999)

    Google Scholar 

  4. Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD International Conference on Management of Data, pp. 439–450 (2000)

    Google Scholar 

  5. Amiri, A.: Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems 43, 181–191 (2007)

    Article  Google Scholar 

  6. Berkhin, P.: A survey of clustering data mining techniques. Grouping Multidimensional Data, 25–71 (2006)

    Google Scholar 

  7. Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 369. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Gkoulalas-Divanis, A., Verykios, V.S.: An integer programming approach for frequent itemset hiding. In: ACM International Conference on Information and Knowledge Management, pp. 748–757 (2006)

    Google Scholar 

  9. Duraiswamy, K., Manjula, D., Maheswari, N.: Advanced approach in sensitive rule hiding. CCSE Modern Applied Science 3, 98–107 (2009)

    Google Scholar 

  10. Gkoulalas-Divanis, A., Verykios, V.S.: Exact knowledge hiding through database extension. IEEE Transactions on Knowledge and Data Engineering 21, 699–713 (2009)

    Article  Google Scholar 

  11. Han, J., Fu, Y.: Mining multiple-level association rules in large databases. IEEE Transactions on Knowledge and Data Engineering 11, 798–805 (1999)

    Article  Google Scholar 

  12. Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Mining and Knowledge Discovery 8, 53–87 (2004)

    Article  MathSciNet  Google Scholar 

  13. Hong, T.P., Lin, C.W., Wu, Y.L.: Incrementally fast updated frequent pattern trees. Expert Systems with Applications 34, 2424–2435 (2008)

    Article  Google Scholar 

  14. Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: A lattice-based data sanitization approach. IEEE International Conference on Systems, Man, and Cybernetics, 2325–2329 (2011)

    Google Scholar 

  15. Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using TF-IDF to hide sensitive itemsets. Applied Intelligence 38, 502–510 (2013)

    Article  Google Scholar 

  16. Kotsiantis, S.B.: Supervised machine learning: A review of classification techniques. In: The Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, pp. 3–24 (2007)

    Google Scholar 

  17. Leary, D.E.O.: Knowledge discovery as a threat to database security. Knowledge Discovery in Databases, pp. 507–516 (1991)

    Google Scholar 

  18. Lin, C.W., Hong, T.P., Lu, W.H.: An effective tree structure for mining high utility itemsets. Expert Systems with Applications 38, 7419–7424 (2011)

    Article  Google Scholar 

  19. Lin, C.W., Hong, T.P., Chang, C.C., Wang, S.L.: A greedy-based approach for hiding sensitive itemsets by transaction insertion. Journal of Information Hiding and Multimedia Signal Processing 4, 201–227 (2013)

    Google Scholar 

  20. Lin, C.W., Hong, T.P.: A survey of fuzzy web mining. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3, 190–199 (2013)

    Google Scholar 

  21. Modi, C.N., Rao, U.P., Patel, D.R.: Maintaining privacy and data quality in privacy preserving association rule mining. In: International Conference on Computing Communication and Networking Technologies, pp. 1–6 (2010)

    Google Scholar 

  22. Wu, Y.H., Chiang, C.M., Chen, A.L.P.: Hiding sensitive association rules with limited side effects. IEEE Transactions on Knowledge and Data Engineering 19, 29–42 (2007)

    Article  Google Scholar 

  23. Zheng, Z., Kohavi, R., Mason, L.: Real world performance of association rule algorithms. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 401–406 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Wei Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Lin, CW., Hong, TP., Hsu, HC. (2014). Hiding Sensitive Itemsets with Minimal Side Effects in Privacy Preserving Data Mining. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume I. Advances in Intelligent Systems and Computing, vol 297. Springer, Cham. https://doi.org/10.1007/978-3-319-07776-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07776-5_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07775-8

  • Online ISBN: 978-3-319-07776-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics