Improving scalability of privacy preserving algorithms
نویسنده
چکیده
Data mining techniques reveal patterns in large databases that may be strategically relevant. Organizations prepare the data before participating in data sharing agreements in order to avoid revealing tactically important insights to external organizations. Viable techniques that preserve the privacy of strategically significant frequent item sets are essential in the protection of a competitive advantage. This research improves the scalability of a frequent item set hiding algorithm through a partitioning heuristic that decomposes an exact hiding algorithm problem formulation into multiple smaller sections that are processed separately to generate partial extensions of the database. The smaller data extensions are then combined to form one extension that reduces the statistical significance of all sensitive frequent item sets without changing the statistical significance of the remaining data. By requiring less processing resources, the partitioning heuristic improves the scalability of the exact hiding algorithm.
منابع مشابه
Classification Rule Mining through SMC for Preserving Privacy Data Mining: A Review
Data Mining and Knowledge Discovery in Databases are two new dimensions of database technology that investigate the automatic extraction for identifying hidden patterns and trends from large amount of data. Several researchers have contributed variety of algorithms for generating the classification rule by considering different cases like scalability, computation time, I/O complexity, missing a...
متن کاملInformation Driven Evaluation of Data Hiding Algorithms
Privacy is one of the most important properties an information system must satisfy. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy when datamining techniques are used. Privacy Preserving Data Mining (PPDM) algorithms have been recently introduced with the aim of modifying the database in such a way to prevent the discovery of sensib...
متن کاملPreserving Privacy in Distributed Systems
We present sTile, a technique for distributing trust-needing computation onto insecure networks, while providing probabilistic guarantees that malicious agents that compromise parts of the network cannot learn private data. With sTile, we explore the fundamental cost of achieving privacy through data distribution and bound how much less efficient a privacy-preserving system is than a non-privat...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کامل