Introducing an algorithm for use to hide sensitive association rules through perturb technique
Authors
Abstract:
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the association rules is one of the methods to preserve privacy and it is a main subject in the field of data mining and database security, for which several algorithms with different approaches are presented so far. An algorithm to hide sensitive association rules with a heuristic approach is presented in this article, where the Perturb technique based on reducing confidence or support rules is applied with the attempt to remove the considered item from a transaction with the highest weight by allocating weight to the items and transactions. Efficiency is measured by the failure criteria of hiding, number of lost rules and ghost rules, and execution time. The obtained results of this study are assessed and compared with two known FHSAR and RRLR algorithms, based on two real databases (dense and sparse). The results indicate that the number of lost rules in all experiments are reduced by 47% in comparison with RRLR and reduced by 23% in comparison with FHSAR. Moreover, the other undesirable side effects, in this proposed algorithm in the worst case are equal to that of the base algorithms.
similar resources
an algorithm to hide sensitive association rules through perturb technique
due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. association rules mining is one of the data mining techniques to extract useful patterns in the form of association rules. one of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. hiding the as...
full textUse HypE to Hide Association Rules by Adding Items
During business collaboration, partners may benefit through sharing data. People may use data mining tools to discover useful relationships from shared data. However, some relationships are sensitive to the data owners and they hope to conceal them before sharing. In this paper, we address this problem in forms of association rule hiding. A hiding method based on evolutionary multi-objective op...
full textImproved Genetic Algorithm Approach for Sensitive Association Rules Hiding
Association rule mining is interesting area of data mining research which discovers correlations between different item sets in a transaction database. Efforts have been made for efficient hiding of sensitive association rules, but these techniques do not consider the consequences such as loss of information, lost rules and increase in ghost rules production. In this paper, we propose improved ...
full textAn Improved Apriori Algorithm for Association Rules
There are several mining algorithms of association rules. One of the most popular algorithms is Apriori that is used to extract frequent itemsets from large database and getting the association rule for discovering the knowledge. Based on this algorithm, this paper indicates the limitation of the original Apriori algorithm of wasting time for scanning the whole database searching on the frequen...
full textAn Efficiently Algorithm for Mining Association Rules
—Association rules mining is one of the most important topic in data mining. A new algorithm for mining association rules is proposed in this paper. In data mining, the process of counting any itemset`s support requires a great I/O and computing cost. An impacted bitmap technique to speed up the counting process is employed in this paper. Nevertheless, saving the intact bitmap usually has a big...
full textHiding Sensitive XML Association Rules With Supervised Learning Technique
In the privacy preservation of association rules, sensitivity analysis should be reported after the quantification of items in terms of their occurrence. The traditional methodologies, used for preserving confidentiality of association rules, are based on the assumptions while safeguarding susceptible information rather than recognition of insightful items. Therefore, it is time to go one step ...
full textMy Resources
Journal title
volume 4 issue 2
pages 219- 227
publication date 2016-07-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023