DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING
نویسندگان
چکیده
منابع مشابه
Hiding Sensitive Association Rule Using Clusters of Sensitive Association Rule
The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Association rules hiding algorithms get strong and efficient performance for protecting confidential and crucial data. The objective of the proposed Association rule hiding algorithm for privacy preserving data mining is to hi...
متن کاملReconstruction-Based Association Rule Hiding
As large repositories of data contain confidential rules that must be protected before published, association rule hiding becomes one of important privacy preserving data mining problems. Compared with traditional data modification methods, data reconstruction is a new promising, but not sufficiently investigated method, which is inspired by the inverse frequent set mining problem. In my PhD pe...
متن کاملHiding Sensitive Fuzzy Association Rules Using Weighted Item Grouping and Rank Based Correlated Rule Hiding Algorithm
Extracting knowledge from large amount of data while preserving the sensitive information is an important issue in data mining. Providing security to sensitive data against unauthorized access has been a long term goal for the database security research community. Almost all the research in privacy preservation is limited to binary dataset. Business and scientific data contain both quantitative...
متن کاملSensitive Itemset Hiding in Multi-level Association Rule Mining
-Enormous numbers of intelligent data mining techniques are in usage to discover hidden patterns. Especially Association rule mining has a high impact on business improvement. However mining association rules at multiplelevel may lead to discovery of more specific and concrete knowledge from data. Privacy is needed in order to withstand the business competence. Now-a-days privacy preserving dat...
متن کاملAssociation Rule Hiding Methods
IntroductIon The enormous expansion of data collection and storage facilities has created an unprecedented increase in the need for data analysis and processing power. Data mining has long been the catalyst for automated and sophisticated data analysis and interrogation. Recent advances in data mining and knowledge discovery have generated controversial impact in both scientific and technologic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science and Cybernetics
سال: 2019
ISSN: 1813-9663,1813-9663
DOI: 10.15625/1813-9663/35/4/14131