Skip to main content

An Improved Algorithm to Protect Sensitive High Utility Itemsets in Transaction Database

  • Conference paper
  • First Online:
Nature of Computation and Communication (ICTCC 2021)

Abstract

Privacy-Preserve Utility Mining is becoming a topic of interest to many researchers. The goal is to protect the sensitive-high utility itemsets in the transaction databases from being exploited by data mining techniques. This paper studies methods to hide sensitive high utility itemsets in transaction databases. There are some effective methods to deal with this problem, but these methods still cause undesirable side effects, such as: being missing hidden itemsets with non-sensitive high utility itemsets, the difference between the original database and the modified database, etc. This paper proposed an improved algorithm for hiding sensitive high utility itemsets, called IEHSHUI, focus on choosing the order to hide sensitive itemsets and selecting items to modify with minimal side effects. Experimental results show that the IEHSHUI proposed algorithm is more efficient than existing algorithms in terms of execution time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (2000)

    Google Scholar 

  2. Atallah, M., et al.: Disclosure limitation of sensitive rules. In: Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX1999) (Cat. No. PR00453). IEEE (1999)

    Google Scholar 

  3. Fournier‐Viger, P., et al.: A survey of itemset mining. Wiley Interdiscipl. Rev. Data Min. Knowl. Discov. 7(4), e1207 (2017)

    Google Scholar 

  4. Huynh Trieu, V., Le Quoc, H., Truong Ngoc, C.: An efficient algorithm for hiding sensitive-high utility itemsets. Intell. Data Anal. 24(4), 831–845 (2020)

    Google Scholar 

  5. Krishnamoorthy, S.: Pruning strategies for mining high utility itemsets. Expert Syst. Appl. 42(5), 2371–2381 (2015)

    Article  Google Scholar 

  6. Lin, C.-W., et al.: A GA-based approach to hide sensitive high utility itemsets. Sci. World J. 2014 (2014)

    Google Scholar 

  7. Lin, J.C.-W., et al.: Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. Artif. Intell. 55, 269–284 (2016)

    Article  Google Scholar 

  8. Liu, X., Wen, S., Zuo, W.: Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining. Appl. Intell. 50(1), 169–191 (2019). https://doi.org/10.1007/s10489-019-01524-2

    Article  Google Scholar 

  9. Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562–10582 (2017)

    Article  Google Scholar 

  10. O’Leary, D.E.: Knowledge discovery as a threat to database security. Knowl. Discov. Database 9, 507–516 (1991)

    Google Scholar 

  11. Rajalaxmi, R., Natarajan, A.: Effective sanitization approaches to hide sensitive utility and frequent itemsets. Intell. Data Anal. 16(6), 933–951 (2012)

    Article  Google Scholar 

  12. Saravanabhavan, C., Parvathi, R.: Privacy preserving sensitive utility pattern mining. J. Theor. Appl. Inf. Technol. 49(2) (2013)

    Google Scholar 

  13. Selvaraj, R., Kuthadi, V.M.: A modified hiding high utility item first algorithm (HHUIF) with item selector (MHIS) for hiding sensitive itemsets. Int. J. Innov. Comput. Inf. Contrl. 9, 4851–4862 (2013)

    Google Scholar 

  14. Vo, B., et al.: An efficient method for hiding high utility itemsets. In: KES-AMSTA (2013)

    Google Scholar 

  15. Yeh, J.-S., Hsu, P.-C.: HHUIF and MSICF: Novel algorithms for privacy preserving utility mining. Expert Syst. Appl. 37(7), 4779–4786 (2010)

    Article  Google Scholar 

  16. Yun, U., Kim, J.: A fast perturbation algorithm using tree structure for privacy preserving utility mining. Expert Syst. Appl. 42(3), 1149–1165 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chien, N.K., Trang, D.T.K. (2021). An Improved Algorithm to Protect Sensitive High Utility Itemsets in Transaction Database. In: Cong Vinh, P., Huu Nhan, N. (eds) Nature of Computation and Communication. ICTCC 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 408. Springer, Cham. https://doi.org/10.1007/978-3-030-92942-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-92942-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-92941-1

  • Online ISBN: 978-3-030-92942-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics