A novel approach for hiding sensitive utility and frequent itemsets

被引:7
|
作者
Liu, Xuan [1 ]
Xu, Feng [1 ]
Lv, Xin [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Sensitive utility and frequent itemsets; sanitization; side effects; maximum boundary value; ASSOCIATION RULES; KNOWLEDGE; ALGORITHMS;
D O I
10.3233/IDA-173613
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data is shared among different organizations for mutual benefit. Data mining techniques are utilized to discover valuable knowledge for decision-making. However, data mining poses a threat to disclose the sensitive information. Thus, the sensitive knowledge should be concealed before releasing data. The pervious works either address the association rule or utility itemsets hiding problem. This paper focuses on preserving the sensitive utility and frequent itemsets, and a sanitization approach named HUFI is presented. The sensitive itemsets are hidden by reducing their support or utility below the minimum thresholds. For a sensitive itemset, the concept of maximum boundary value is introduced to determine the hidden strategy. Then, a transaction supporting minimal number of non-sensitive itemsets is selected to be sanitized. In such a transaction, a weight is assigned to each item contained in the sensitive itemset, and an item with the highest weight is selected to be modified. We compared HUFI with the state of the art algorithms on various databases. The experiment results show that HUFI outperforms the other algorithms in minimizing the side effects on non-sensitive knowledge and maintaining the database quality after the sanitization process. In addition, the impact of database density on sanitization approaches is observed.
引用
收藏
页码:1259 / 1278
页数:20
相关论文
共 50 条
  • [21] A MODIFIED HIDING HIGH UTILITY ITEM FIRST ALGORITHM (HHUIF) WITH ITEM SELECTOR (MHIS) FOR HIDING SENSITIVE ITEMSETS
    Selvaraj, Rajalakshmi
    Kuthadi, Venu Madhav
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (12): : 4851 - 4862
  • [22] An Efficient Method for Hiding High Utility Itemsets
    Bay Vo
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Vu, Vinh V.
    Minh Nguyen
    Bac Le
    ADVANCED METHODS AND TECHNOLOGIES FOR AGENT AND MULTI-AGENT SYSTEMS, 2013, 252 : 356 - 363
  • [24] A Greedy Approach to Hide Sensitive Frequent Itemsets with Reduced Side Effects
    Suma, B.
    Shobha, G.
    CYBER-PHYSICAL SYSTEMS AND DIGITAL TWINS, 2020, 80 : 849 - 858
  • [25] Hiding sensitive itemsets without side effects
    Surendra, H.
    Mohan, H. S.
    APPLIED INTELLIGENCE, 2019, 49 (04) : 1213 - 1227
  • [26] Hiding sensitive itemsets with multiple objective optimization
    Lin, Jerry Chun-Wei
    Zhang, Yuyu
    Zhang, Binbin
    Fournier-Viger, Philippe
    Djenouri, Youcef
    SOFT COMPUTING, 2019, 23 (23) : 12779 - 12797
  • [27] Hiding sensitive itemsets with multiple objective optimization
    Jerry Chun-Wei Lin
    Yuyu Zhang
    Binbin Zhang
    Philippe Fournier-Viger
    Youcef Djenouri
    Soft Computing, 2019, 23 : 12779 - 12797
  • [28] A novel approach for data stream maximal frequent itemsets mining
    Xu C.-H.
    Xu, Chong-Huan (talentxch@163.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 224 - 231
  • [29] Hiding sensitive itemsets without side effects
    Surendra H
    Mohan H S
    Applied Intelligence, 2019, 49 : 1213 - 1227
  • [30] Performance Oriented Mining of Utility Frequent Itemsets
    Nathiarasan, Sakthi A.
    Manikandan, M.
    2014 INTERNATIONAL CONFERENCE ON CIRCUITS, COMMUNICATION, CONTROL AND COMPUTING (I4C), 2014, : 317 - 321