Skip to main content

Multiobjective-integer-programming-based Sensitive Frequent Itemsets Hiding

  • Conference paper
Knowledge Science, Engineering and Management (KSEM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8041))

  • 2227 Accesses

Abstract

Due to substantial commercial benefits in the discovered frequent patterns from large databases, frequent itemsets mining has become one of the most meaningful studies in data mining. However, it also increases the risk of disclosing some sensitive patterns through the data mining process. In this paper, a multi-objective integer programming, considering both data accuracy and information loss, is proposed to solve the problem for hiding sensitive frequent itemsets. Further, we solve this optimization model by a two-phased procedure, where in the first procedure the sanitized transactions can be pinpointed and in the second procedure the sanitized items can be pinpointed. Finally, we conduct some extensive tests on publicly available real data. These experiments’ results illustrate that our approach is very effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Menon, S., Sarkar, S., Mukherjee, S.: Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 16(3), 256–270 (2005)

    Article  Google Scholar 

  2. Oliveira, S.R.M., Zaïane, O.R.: Privacy preserving frequent itemset mining. In: Proc. of the 2002 IEEE International Conference on Privacy, Security and Data Mining (CRPIT 2002), pp. 43–54 (2002)

    Google Scholar 

  3. Oliveira, S.R.M., Zaïane, O.R.: Protecting sensitive knowledge by data sanitization. In: Proceeding of the Third IEEE International Conference on Data Mining (ICDM 2003), pp. 211–218 (2003)

    Google Scholar 

  4. Amiri, A.: Dare to share:Protecting sensitive knowledge with data sanitization. Decision Support Systems 43(1), 181–191 (2007)

    Article  Google Scholar 

  5. Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: ICDM 2005: Proceedings of the Fifth IEEE International Conference on Data Mining, pp. 426–433 (2005)

    Google Scholar 

  6. Menon, S., Sarkar, S.: Minimizing information loss and preserving privacy. Management Science 53(1), 101–116 (2007)

    Article  MATH  Google Scholar 

  7. Guo, Y.: Reconstruction-Based Association Rule Hiding. In: Proceedings of SIGMOD 2007 Ph.D.Workshop on Innovative Database Research 2007 (IDAR 2007), June 10 (2007)

    Google Scholar 

  8. Gkoulalas-Divanis, A., Verykios, V.S.: Exact Knowledge Hiding through Database Extension. IEEE Transactions on Knowlege and Data Engineering 21(5), 699–713 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, M., He, Y., Pan, D. (2013). Multiobjective-integer-programming-based Sensitive Frequent Itemsets Hiding. In: Wang, M. (eds) Knowledge Science, Engineering and Management. KSEM 2013. Lecture Notes in Computer Science(), vol 8041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39787-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39787-5_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39786-8

  • Online ISBN: 978-3-642-39787-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics