Abstract
Privacy-Preserving Data Mining (PPDM) is taking more focus in the recent years due to growing concern about privacy. Association rule mining is a widely used data mining technique. The goal of privacy-preserved association rule mining is to protect sensitive rules from disclosing in the published data. It is achieved by reducing the confidence below a minimum threshold or adding noise to the original confidence of the sensitive rules. Existing data sanitization techniques suffer from side effects which reduce the utility of the data. We propose a model-based approach for preserving the privacy of sensitive rules without side effects. The proposed value distortion-based sanitization algorithm sanitizes the closed itemsets instead of transactions of the database. Also, the proposed solution is scalable for distorting the whole database without changing the relationship between attribute values or itemsets in the original database. Experimental results show that the proposed method is better than other well-known techniques based on transaction modification concerning the sanitization time and side effects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Charu, C.A., Philip, S.Y.: Privacy-Preserving Data Mining: Models and Algorithms. In: Springer series in Advances in Database Systems, vol. 34 (2008)
Caiola, G., Reiter, J.P.: Random forests for generating partially synthetic, categorical data. Trans. Data Priv. 27–42 (2010)
Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: PrivBayes: private data release via Bayesian networks. In: Proceedings of ACM SIGMOD International Conference on Management of Data, June 2014, pp. 1423–1434
Jumaah, A.K., Al-Janabi, S., Ali, N.A.: An enhanced algorithm for hiding sensitive association rules based on ISL and DSR algorithms. Int. J. Comput. Netw. Technol. Teach. 3(3), 83–89 (2015)
Cheng, P., Lee, I., Li, L., Tseng, K.-K., Pan, J.-S.: BRBA: a blocking-based association rule hiding method. In: Proceedings of the 13th AAAI Conference on Artificial Intelligence, pp. 4200–4201. ACM (2016)
Tsai, Y.-C., Wang, S.-L., Song, C.-Y., Ting, I.-H.: Privacy and utility of k-anonimity on association rule hiding. In: Proceedings of the 3rd Multidisciplinary International Social Networks Conference on Social Informatics, Data Science, Aug 2016, Article no. 42, pp, 42:1–42:6
Hong, T.-P., Lin, C.-W., Yang, K.-T., Wang, S.-L.: Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4), 502–510 (2013). (Springer)
Modi, C.N., Rao, U.P., Patel, D.R.: Maintaining privacy and data quality in privacy preserving association rule mining. In: International Conference on Computing Communication and Network Technologies. IEEE (2010)
Le, H.Q., Arch-Int, S., Nguyen, H.X., Arch-Int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Ind. 64(7), 776–784 (2013). (Elsevier)
Shahsavari, A., Hosseinzadeh, S.: CISA and FISA: efficient algorithms for hiding association rules based on consequent and full item sensitivities. In: Proceedings of International Symposium on Telecommunications, pp. 977–982. IEEE (2014)
Cheng, P., Pan, J.-S., Harbin, C.-W.L.: Use EMO to protect sensitive knowledge in association rule mining by removing items. In: Proceedings of IEEE Congress on Evolutionary Computing, Jul 2014, pp. 1108–1115
Bonam, J., Reddy, A.R., Kalyani, G.: Privacy preserving in association rule mining by data distortion using PSO, ICT and critical infrastructure. In: Proceedings of the 48th Annual Convention of Computer Society of India—vol II, Advances in Intelligent Systems and Computing, vol. 249, pp. 551–558 (2014)
Frequent Itemset Mining Implementations Repository. http://fimi.ua.ac.be/, http://fimi.ua.ac.be/data/. Accessed 27 Mar 2017
Zaki, M.J., Hsiao, C.-J.: CHARM: an efficient algorithm for closed itemset mining. In: Proceedings of International Conference on Data Mining, pp. 457–473, Apr 2002
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Surendra, H., Mohan, H.S. (2019). Distortion-Based Privacy-Preserved Association Rules Mining Without Side Effects Using Closed Itemsets. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 813. Springer, Singapore. https://doi.org/10.1007/978-981-13-1498-8_52
Download citation
DOI: https://doi.org/10.1007/978-981-13-1498-8_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1497-1
Online ISBN: 978-981-13-1498-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)