Skip to main content

Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis

  • Conference paper
Book cover Advanced Computing (CCSIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 133))

  • 1712 Accesses

Abstract

Privacy preservation is widely talked in recent years, which prevents the disclosure of sensitive information during the knowledge discovery. There are many applications of distributed scenario which includes retail shops, where the stream of digital data is collected from time to time. The collaborating parties are generally interested in finding global patterns for their mutual benefits. There are few proposals which address these issues, but in the existing methods, global pattern computation is carried out by one of the source itself and uses one offset to perturb the personal data which fails in many situations such as all the patterns are not initiated at the initial participating party. Our novel approach addresses these problems for retail shops in strategic way by considering the different offsets to perturb the sensitive information and trusted third party to ensure global pattern computation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, J.-W., Tseng, C.-Y., Ou, J.-C., Chen, M.-S.: A General Model for Sequential Pattern Mining with a Progressive Database. International Journal of Knowledge and Data Engineering 20, 1153–1167 (2008)

    Article  Google Scholar 

  2. Mhatre, A., Verma, M., Toshniwal, D.: Privacy Preserving Sequential Pattern Mining in Progressive Databases using Noisy Data. In: International Conference on Information Visualization, pp. 456–460 (2009)

    Google Scholar 

  3. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM SIGMOD Conference on Management of Data, New York, USA, pp. 439–450 (2000)

    Google Scholar 

  4. Samarati, P.: Protecting Respondents’ Identities in Micro data Release. IEEE Trans. Knowledge Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  5. Fung, B., Wang, K., Yu, P.: Top-Down Specialization for Information and Privacy Preservation. In: ICDE Conference, pp. 205–216 (2005)

    Google Scholar 

  6. LeFevre, K., De Witt, D., Ramakrishnan, R.: Incognito: Full Domain K-Anonymity. In: ACM SIGMOD Conference, Maryland, pp. 49–60 (2005)

    Google Scholar 

  7. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional K-Anonymity. In: ICDE Conference, pp. 25–25 (2006)

    Google Scholar 

  8. Park, H., Shim, K.: Approximate Algorithms for K-anonymity. In: ACM SIGMOD Conference, Beijing, China, pp. 67–78 (2007)

    Google Scholar 

  9. Wang, K., Yu, P., Chakraborty, S.: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. In: ICDM Conference, pp. 249–256 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

B.N., K., Toshniwal, D. (2011). Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17881-8_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17880-1

  • Online ISBN: 978-3-642-17881-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics