double clustering method in hiding association rules
نویسندگان
چکیده
association rules are among important techniques in data mining which are used for extracting hidden patterns and knowledge in large volumes of data. association rules help individuals and organizations take strategic decisions and improve their business processes. extracted association rules from a database contain important and confidential information that if published, the privacy of individuals may be threatened. therefore, the process of hiding sensitive association rules should be performed prior to sharing the database. this is done through changing the database transactions. these changes must be made in such a way that all sensitive association rules are hidden and a maximum number of non-sensitive association rules are extractable from the sanitized database. in fact, a balance is to be established between hiding the sensitive rules and extracting the non-sensitive rules. a new algorithm is presented in this paper to create a balance between preserving privacy and extracting knowledge. the items of sensitive rules are clustered in the proposed algorithm, in order to reduce changes. in fact, reduction of changes and clustering of rules are applied in order to reduce the side effects of the hiding process on non-sensitive rules.
منابع مشابه
Hiding Generalized Association Rules in RDF Databases
One of the important usage of RDF documents is storing semi-structured and structured data for web information systems. But large repositories of data on the web may contain sensitive information that must be protected against unauthorized access. A possible problem, and still not investigated in this documents, is need to balance confidentiality of disclosed data with legitimate needs of the d...
متن کاملClustering Association Rules
We consider the problem of clustering two-dimensional association rules in large databases. We present a geometricbased algorithm, BitOp, for performing the clustering, embedded within an association rule clustering system, ARCS. Association rule clustering is useful when the user desires to segment the data. We measure the quality of the segmentation generated by ARCS using the Minimum Descrip...
متن کاملRetaining Customers Using Clustering and Association Rules in Insurance Industry: A Case Study
This study clusters customers and finds the characteristics of different groups in a life insurance company in order to find a way for prediction of customer behavior based on payment. The approach is to use clustering and association rules based on CRISP-DM methodology in data mining. The researcher could classify customers of each policy in three different clusters, using association rules. A...
متن کاملHiding Association Rules by Using Confidence and Support
Large repositories of data contain sensitive information which must be protected against unauthorized access. The protection of the confidentiality of tills information has been a long-term goal for the database security research community and the government statistical agencies. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encount...
متن کاملHiding Sensitive XML Association Rules With Supervised Learning Technique
In the privacy preservation of association rules, sensitivity analysis should be reported after the quantification of items in terms of their occurrence. The traditional methodologies, used for preserving confidentiality of association rules, are based on the assumptions while safeguarding susceptible information rather than recognition of insightful items. Therefore, it is time to go one step ...
متن کاملA Theoretical Approach for Hiding Sensitive Association Rules
Data mining process is used to extract knowledge from the database. Large numbers of data mining tools are available to get the useful information. These tools can be utilized to break the privacy and security of useful sensitive information present in the database. This sensitive information may be personal information, patterns, facts etc. This sensitive information if mined will result in lo...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
journal of advances in computer researchناشر: sari branch, islamic azad university
ISSN 2345-606X
دوره 7
شماره 1 2016
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023