Skip to main content

Distortion-Based Privacy-Preserved Association Rules Mining Without Side Effects Using Closed Itemsets

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 813))

Abstract

Privacy-Preserving Data Mining (PPDM) is taking more focus in the recent years due to growing concern about privacy. Association rule mining is a widely used data mining technique. The goal of privacy-preserved association rule mining is to protect sensitive rules from disclosing in the published data. It is achieved by reducing the confidence below a minimum threshold or adding noise to the original confidence of the sensitive rules. Existing data sanitization techniques suffer from side effects which reduce the utility of the data. We propose a model-based approach for preserving the privacy of sensitive rules without side effects. The proposed value distortion-based sanitization algorithm sanitizes the closed itemsets instead of transactions of the database. Also, the proposed solution is scalable for distorting the whole database without changing the relationship between attribute values or itemsets in the original database. Experimental results show that the proposed method is better than other well-known techniques based on transaction modification concerning the sanitization time and side effects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Charu, C.A., Philip, S.Y.: Privacy-Preserving Data Mining: Models and Algorithms. In: Springer series in Advances in Database Systems, vol. 34 (2008)

    Google Scholar 

  2. Caiola, G., Reiter, J.P.: Random forests for generating partially synthetic, categorical data. Trans. Data Priv. 27–42 (2010)

    Google Scholar 

  3. Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: PrivBayes: private data release via Bayesian networks. In: Proceedings of ACM SIGMOD International Conference on Management of Data, June 2014, pp. 1423–1434

    Google Scholar 

  4. Jumaah, A.K., Al-Janabi, S., Ali, N.A.: An enhanced algorithm for hiding sensitive association rules based on ISL and DSR algorithms. Int. J. Comput. Netw. Technol. Teach. 3(3), 83–89 (2015)

    Google Scholar 

  5. Cheng, P., Lee, I., Li, L., Tseng, K.-K., Pan, J.-S.: BRBA: a blocking-based association rule hiding method. In: Proceedings of the 13th AAAI Conference on Artificial Intelligence, pp. 4200–4201. ACM (2016)

    Google Scholar 

  6. Tsai, Y.-C., Wang, S.-L., Song, C.-Y., Ting, I.-H.: Privacy and utility of k-anonimity on association rule hiding. In: Proceedings of the 3rd Multidisciplinary International Social Networks Conference on Social Informatics, Data Science, Aug 2016, Article no. 42, pp, 42:1–42:6

    Google Scholar 

  7. Hong, T.-P., Lin, C.-W., Yang, K.-T., Wang, S.-L.: Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4), 502–510 (2013). (Springer)

    Google Scholar 

  8. Modi, C.N., Rao, U.P., Patel, D.R.: Maintaining privacy and data quality in privacy preserving association rule mining. In: International Conference on Computing Communication and Network Technologies. IEEE (2010)

    Google Scholar 

  9. Le, H.Q., Arch-Int, S., Nguyen, H.X., Arch-Int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Ind. 64(7), 776–784 (2013). (Elsevier)

    Google Scholar 

  10. Shahsavari, A., Hosseinzadeh, S.: CISA and FISA: efficient algorithms for hiding association rules based on consequent and full item sensitivities. In: Proceedings of International Symposium on Telecommunications, pp. 977–982. IEEE (2014)

    Google Scholar 

  11. Cheng, P., Pan, J.-S., Harbin, C.-W.L.: Use EMO to protect sensitive knowledge in association rule mining by removing items. In: Proceedings of IEEE Congress on Evolutionary Computing, Jul 2014, pp. 1108–1115

    Google Scholar 

  12. Bonam, J., Reddy, A.R., Kalyani, G.: Privacy preserving in association rule mining by data distortion using PSO, ICT and critical infrastructure. In: Proceedings of the 48th Annual Convention of Computer Society of India—vol II, Advances in Intelligent Systems and Computing, vol. 249, pp. 551–558 (2014)

    Google Scholar 

  13. Frequent Itemset Mining Implementations Repository. http://fimi.ua.ac.be/, http://fimi.ua.ac.be/data/. Accessed 27 Mar 2017

  14. Zaki, M.J., Hsiao, C.-J.: CHARM: an efficient algorithm for closed itemset mining. In: Proceedings of International Conference on Data Mining, pp. 457–473, Apr 2002

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. Surendra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Surendra, H., Mohan, H.S. (2019). Distortion-Based Privacy-Preserved Association Rules Mining Without Side Effects Using Closed Itemsets. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 813. Springer, Singapore. https://doi.org/10.1007/978-981-13-1498-8_52

Download citation

Publish with us

Policies and ethics