Learning and synchronized privacy preserving frequent pattern mining

被引:0
|
作者
Guo Y.-H. [1 ,2 ]
Tong Y.-H. [2 ]
Tang S.-W. [2 ]
Wu L.-D. [3 ]
机构
[1] Department of Information Technology, University of International Relations
[2] Key Laboratory of Machine Perception (Ministry of Education), Peking University
[3] Department of Computing Science, University of Alberta
来源
Ruan Jian Xue Bao/Journal of Software | 2011年 / 22卷 / 08期
关键词
Frequent pattern mining; Learning-based; Privacy preserving; Randomization; Supervised;
D O I
10.3724/SP.J.1001.2011.04000
中图分类号
学科分类号
摘要
To improve the accuracy of mining results, this paper proposes a method of privacy preserving frequent pattern mining, based on sample learning and synchronized randomization of itemset (LS-PPFM). The method utilizes the data of individuals who do not care privacy. First, the data that does not need protecting are learned, and some strongly associated items are obtained. Then, when the data is randomized, the associated items are bound together and randomized synchronously to try to keep their potential associations. Experimental results show that compared with independent randomization, LS-PPFM can achieve significant improvements on accuracy, while losing a little privacy. © 2011 ISCAS.
引用
收藏
页码:1749 / 1760
页数:11
相关论文
共 16 条
  • [1] Vaidya J., Clifton C., Privacy preserving association rule mining in vertically partitioned data, Proc. of the 8th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining (SIGKDD 2002), pp. 639-644, (2002)
  • [2] Kantarcioglu M., Clifton C., Privacy-Preserving distributed mining of association rules on horizontally partitioned data, IEEE Trans. on Knowledge and Data Engineering (TKDE), 16, 9, pp. 1026-1037, (2004)
  • [3] Rizvi S.J., Haritsa J.R., Maintaining data privacy in association rule mining, Proc. of the 28th Int'l Conf. on Very Large Data Bases (VLDB 2002), pp. 682-693, (2002)
  • [4] Agrawal S., Krishnan V., Haritsa J., On addressing efficiency concerns in privacy preserving mining, Proc. of the 9th Int'l Conf. on Database Systems for Advanced Applications (DASFAA 2004), pp. 113-124, (2004)
  • [5] Xia Y., Yang Y., Chi Y., Mining association rules with non-uniform privacy concerns, Proc. of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD 2004), pp. 27-34, (2004)
  • [6] Agrawal S., Haritsa J., A framework for high-accuracy privacy-preserving mining, Proc. of the 21st IEEE Int'l Conf. on Data Engineering (ICDE 2005), pp. 193-204, (2005)
  • [7] Zhang P., Tong Y.H., Tang S.W., Yang D.Q., Ma X.L., An effective method for privacy preserving association rule mining, Journal of Software, 17, 8, pp. 1764-1774, (2006)
  • [8] Xu C.F., Wang J.L., An efficient incremental algorithm for frequent itemsets mining in distorted databases with granular computing, Proc. of the 5th IEEE/WIC/ACM Int'l Conf. on Web Intelligence (WI 2006), pp. 913-918, (2006)
  • [9] Andruszkiewicz P., Optimization for mask scheme in privacy preserving data mining for association rules, Proc. of Int'l Conf. Rough Sets and Emerging Intelligent Systems Paradigms (RSEISP 2007), pp. 465-474, (2007)
  • [10] Huang Z.L., Du W.L., Teng Z.X., Searching for better randomized response schemes for privacy-preserving data mining, Proc. of the 11th European Conf. on Principles and Practice of Knowledge Discovery in Databases (PKDD 2007), pp. 487-497, (2007)