A novel approach for hiding sensitive utility and frequent itemsets

被引:7
|
作者
Liu, Xuan [1 ]
Xu, Feng [1 ]
Lv, Xin [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Sensitive utility and frequent itemsets; sanitization; side effects; maximum boundary value; ASSOCIATION RULES; KNOWLEDGE; ALGORITHMS;
D O I
10.3233/IDA-173613
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data is shared among different organizations for mutual benefit. Data mining techniques are utilized to discover valuable knowledge for decision-making. However, data mining poses a threat to disclose the sensitive information. Thus, the sensitive knowledge should be concealed before releasing data. The pervious works either address the association rule or utility itemsets hiding problem. This paper focuses on preserving the sensitive utility and frequent itemsets, and a sanitization approach named HUFI is presented. The sensitive itemsets are hidden by reducing their support or utility below the minimum thresholds. For a sensitive itemset, the concept of maximum boundary value is introduced to determine the hidden strategy. Then, a transaction supporting minimal number of non-sensitive itemsets is selected to be sanitized. In such a transaction, a weight is assigned to each item contained in the sensitive itemset, and an item with the highest weight is selected to be modified. We compared HUFI with the state of the art algorithms on various databases. The experiment results show that HUFI outperforms the other algorithms in minimizing the side effects on non-sensitive knowledge and maintaining the database quality after the sanitization process. In addition, the impact of database density on sanitization approaches is observed.
引用
收藏
页码:1259 / 1278
页数:20
相关论文
共 50 条
  • [1] A border-based approach for hiding sensitive frequent itemsets
    Sun, XZ
    Yu, PS
    FIFTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2005, : 426 - 433
  • [2] Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice
    Huynh Trieu Vy
    Le Quoc Hai
    Nguyen Thanh Long
    Truong Ngoc Chau
    Le Quoc Hieu
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (01) : 3 - 23
  • [3] A MaxMin approach for hiding frequent itemsets
    Moustakides, George V.
    Verykios, Vassihos S.
    DATA & KNOWLEDGE ENGINEERING, 2008, 65 (01) : 75 - 89
  • [4] A border-based integer programming approach for hiding sensitive frequent itemsets
    Wang, Mingzheng
    He, Yue
    Han, Haishan
    ICIC Express Letters, 2013, 7 (3 B): : 1073 - 1080
  • [5] A TRADEOFF BALANCING ALGORITHM FOR HIDING SENSITIVE FREQUENT ITEMSETS
    Gokce, Harun
    Abul, Osman
    KDIR 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND INFORMATION RETRIEVAL, 2010, : 200 - 205
  • [6] A max-min approach for hiding frequent itemsets
    Moustakides, George V.
    Verykios, Vassilios S.
    ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 502 - +
  • [7] H-FHAUI: Hiding frequent high average utility itemsets
    Le, Bac
    Truong, Tin
    Duong, Hai
    Fournier-Viger, Philippe
    Fujita, Hamido
    INFORMATION SCIENCES, 2022, 611 : 408 - 431
  • [8] An efficient algorithm for hiding sensitive-high utility itemsets
    Trieu, Vy Huynh
    Quoc, Hai Le
    Ngoc, Chau Truong
    INTELLIGENT DATA ANALYSIS, 2020, 24 (04) : 831 - 845
  • [9] Effective sanitization approaches to hide sensitive utility and frequent itemsets
    Rajalaxmi, R. R.
    Natarajan, A. M.
    INTELLIGENT DATA ANALYSIS, 2012, 16 (06) : 933 - 951
  • [10] Efficient privacy preserving algorithms for hiding sensitive high utility itemsets
    Ashraf, Mohamed
    Rady, Sherine
    Abdelkader, Tamer
    Gharib, Tarek F.
    COMPUTERS & SECURITY, 2023, 132