Skip to main content

Hiding Predictive Association Rules on Horizontally Distributed Data

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5579))

Abstract

In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to hide the Collaborative Recommendation Association Rules (CRAR) and to merge the (sanitized) data sets are introduced. Performance and various side effects of the proposed approaches are analyzed numerically. Comparisons of non-trusting and trusting third-party approach are reported. Numerical results show that the non-trusting third-party approach has better processing time, with similar side effects to the trusting third-party approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggarwal, C., Yu, P.S.: Privacy-Preserving Data Mining: Models and Algorithms. Springer, Heidelberg (2008)

    Book  Google Scholar 

  2. Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data, Washington, DC, May 1993, pp. 207–216 (1993)

    Google Scholar 

  3. Atallah, A., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure Limitation of Sensitive Rules. In: Proceedings of IEEE Knowledge and Data Engineering Workshop, Chicago, Illinois, November 1999, pp. 45–52 (1999)

    Google Scholar 

  4. Evfimievski, A.: Randomization in Privacy Preserving Data Mining. SIGKDD Explorations 4(2), 43–48 (2002)

    Article  Google Scholar 

  5. Han, J., Pei, J., Yin, Y.: Mining Frequent Patterns without Candidate Generation. In: Proceedings of ACM International Conference on Management of Data (SIGMOD), pp. 1–12 (2002)

    Google Scholar 

  6. Huang, H., Wu, X., Relue, R.: Association Analysis with One Scan of Databases. In: Proceedings of IEEE International Conference on Data Mining, Maebashi City, Japan, December 2002, pp. 629–632 (2002)

    Google Scholar 

  7. IBM. Almaden. Quest Synthetic Data Generation Code, http://www.almaden.ibm.com/cs/disciplines/iis/

  8. Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, June 2002, pp. 24–31 (2002)

    Google Scholar 

  9. Oliveira, S., Zaiane, O.: An Efficient On-Scan Sanitization for Improving the Balance Between Privacy and Knowledge Discovery. Technical Report TR 03-15, Department of Computing Science, University of Alberta, Canada (June 2003)

    Google Scholar 

  10. Oliveira, S., Zaiane, O.: A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration. Int. J. Business Intelligence and Data Mining 1(3), 247–287 (2006)

    Article  Google Scholar 

  11. Vaidya, J., Clifton, C.: Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, July 2002, pp. 639–644 (2002)

    Google Scholar 

  12. Verykios, V., Elmagarmid, A., Bertino, E., Saygin, Y., Dasseni, E.: Association Rules Hiding. IEEE Transactions on Knowledge and Data Engineering 16(4), 434–447 (2004)

    Article  MATH  Google Scholar 

  13. Wang, S.L., Patel, D., Jafari, A., Hong, T.P.: Hiding Collaborative Recommendation Association Rules. Applied Intelligence 26(1), 66–77 (2007)

    Google Scholar 

  14. Wang, S.L., Hong, H.P.: One-Scan Sanitization of Collaborative Recommendation Association Rules. In: Proceedings of National Computer Symposium, Taichun, Taiwan, November 2007, pp. 170–176 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, SL., Lai, TZ., Hong, TP., Wu, YL. (2009). Hiding Predictive Association Rules on Horizontally Distributed Data. In: Chien, BC., Hong, TP., Chen, SM., Ali, M. (eds) Next-Generation Applied Intelligence. IEA/AIE 2009. Lecture Notes in Computer Science(), vol 5579. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02568-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02568-6_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02567-9

  • Online ISBN: 978-3-642-02568-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics