Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

IFIP International Information Security Conference

SEC 2008: Proceedings of The Ifip Tc 11 23rd International Information Security Conference pp 349–363Cite as

  1. Home
  2. Proceedings of The Ifip Tc 11 23rd International Information Security Conference
  3. Conference paper
A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases

A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases

  • Aris Gkoulalas-Divanis7 &
  • Vassilios S. Verykios7 
  • Conference paper
  • 1246 Accesses

  • 4 Citations

Part of the IFIP – The International Federation for Information Processing book series (IFIPAICT,volume 278)

Abstract

The hiding of sensitive knowledge, mined from transactional databases, is one of the primary goals of privacy preserving data mining. The increased storage capabilities of modern databases and the necessity for hiding solutions of superior quality, paved the way for parallelization of the hiding process. In this paper, we introduce a novel framework for decomposition and parallel solving of a category of hiding algorithms, known as exact. Exact algorithms hide the sensitive knowledge without any critical compromises, such as the blocking of non-sensitive patterns or the appearance of infrequent itemsets, among the frequent ones, in the sanitized outcome. The proposed framework substantially improves the size of the problems that the exact algorithms can efficiently handle, by significantly reducing their runtime. Furthermore, the generality of the framework makes it appropriate for any hiding algorithm that leads to a constraint satisfaction problem involving linear constraints of binary variables. Through experiments, we demonstrate the effectiveness of our solution on handling a large variety of hiding problem instances.

Key words

  • Exact knowledge hiding
  • Parallelization
  • Constraints satisfaction problems
  • Binary integer programming

Download conference paper PDF

References

  1. 1. ILOG CPLEX 9.0 User’s Manual. ILOG Inc., Gentilly, France (2003)

    Google Scholar 

  2. Agrawal, R., Shafer, J.C.: Parallel mining of association rules. IEEE Transactions on Knowledge and Data Engineering (TKDE) 8(1), 962–969

    Google Scholar 

  3. 3. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.S.: Disclosure limitation of sensitive rules. In: Proceedings of the IEEE Knowledge and Data Engineering Exchange Workshop (KDEX), pp. 45–52 (1999)

    Google Scholar 

  4. 4. Bayardo, R.: Efficiently mining long patterns from databases. Proceedings of the ACM SIGMOD International Conference on Management of Data (1998)

    Google Scholar 

  5. 5. Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. National Science Foundation Workshop on Next Generation Data Mining (WNGDM) pp. 126–133 (2002)

    Google Scholar 

  6. 6. Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 15–19 (1996)

    Google Scholar 

  7. 7. Gkoulalas-Divanis, A., Verykios, V.S.: An integer programming approach for frequent itemset hiding. In: Proceedings of the ACM Conference on Information and Knowledge Management (CIKM) (2006)

    Google Scholar 

  8. 8. Gkoulalas-Divanis, A., Verykios, V.S.: A hybrid approach to frequent itemset hiding. In: Proceedings of the IEEE International Conference on Tools with Artificial Intelligence (ICTAI) (2007)

    Google Scholar 

  9. 9. Han, E.H., Karypis, G., Kumar, V.: Scalable parallel data mining for association rules. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 277–288 (2007)

    Google Scholar 

  10. Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering (TKDE) 16(9), 1026–1037 (2004)

    CrossRef  Google Scholar 

  11. Karypis, G., Kumar, V.: A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM Journal of Scientific Computing 20(1), 359–392 (1998)

    CrossRef  Google Scholar 

  12. Kohavi, R., Brodley, C., Frasca, B., Mason, L., Zheng, Z.: KDD-Cup 2000 organizers’ report: Peeling the onion. SIGKDD Explorations 2(2), 86–98 (2000)

    Google Scholar 

  13. Menon, S., Sarkar, S., Mukherjee, S.: Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 16(3), 256–270 (2005)

    Google Scholar 

  14. 14. Oliveira, S.R.M., Zaïane, O.R.: Privacy preserving frequent itemset mining. In: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining (CRPITS), pp. 43–54 (2002)

    Google Scholar 

  15. Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. ACM SIGMOD Record 30(4), 45–54 (2001)

    CrossRef  Google Scholar 

  16. 16. Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), pp. 426–433 (2005)

    Google Scholar 

  17. Yokoo, M., Durfee, E.H., Ishida, T., Kuwabara, K.: The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and Data Engineering 10(5), 673–685 (1998)

    CrossRef  Google Scholar 

  18. 18. Zaïane, O.R., M.El-Hajj, Lu, P.: Fast parallel association rule mining without candidacy generation. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), pp. 665–668 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer and Communication Engineering, University of Thessaly, Volos, Greece

    Aris Gkoulalas-Divanis & Vassilios S. Verykios

Authors
  1. Aris Gkoulalas-Divanis
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Vassilios S. Verykios
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. George Mason University, USA

    Sushil Jajodia

  2. University of Milano-Bicocca, Italy

    Pierangela Samarati

  3. University of Salerno, Italy

    Stelvio Cimato

Rights and permissions

Reprints and Permissions

Copyright information

© 2008 IFIP International Federation for Information Processing

About this paper

Cite this paper

Gkoulalas-Divanis, A., Verykios, V.S. (2008). A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_23

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-0-387-09699-5_23

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09698-8

  • Online ISBN: 978-0-387-09699-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.212

Not affiliated

Springer Nature

© 2023 Springer Nature