A novel approach for hiding sensitive utility and frequent itemsets

被引:7
|
作者
Liu, Xuan [1 ]
Xu, Feng [1 ]
Lv, Xin [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Sensitive utility and frequent itemsets; sanitization; side effects; maximum boundary value; ASSOCIATION RULES; KNOWLEDGE; ALGORITHMS;
D O I
10.3233/IDA-173613
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data is shared among different organizations for mutual benefit. Data mining techniques are utilized to discover valuable knowledge for decision-making. However, data mining poses a threat to disclose the sensitive information. Thus, the sensitive knowledge should be concealed before releasing data. The pervious works either address the association rule or utility itemsets hiding problem. This paper focuses on preserving the sensitive utility and frequent itemsets, and a sanitization approach named HUFI is presented. The sensitive itemsets are hidden by reducing their support or utility below the minimum thresholds. For a sensitive itemset, the concept of maximum boundary value is introduced to determine the hidden strategy. Then, a transaction supporting minimal number of non-sensitive itemsets is selected to be sanitized. In such a transaction, a weight is assigned to each item contained in the sensitive itemset, and an item with the highest weight is selected to be modified. We compared HUFI with the state of the art algorithms on various databases. The experiment results show that HUFI outperforms the other algorithms in minimizing the side effects on non-sensitive knowledge and maintaining the database quality after the sanitization process. In addition, the impact of database density on sanitization approaches is observed.
引用
收藏
页码:1259 / 1278
页数:20
相关论文
共 50 条
  • [31] A multi-objective evolutionary approach for mining frequent and high utility itemsets
    Zhang, Lei
    Fu, Guanglong
    Cheng, Fan
    Qiu, Jianfeng
    Su, Yansen
    APPLIED SOFT COMPUTING, 2018, 62 : 974 - 986
  • [32] A GA-Based Approach to Hide Sensitive High Utility Itemsets
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Wong, Jia-Wei
    Lan, Guo-Cheng
    Lin, Wen-Yang
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [33] Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization
    Lefkir, Mira
    Nouioua, Farid
    Fournier-Viger, Philippe
    APPLIED INTELLIGENCE, 2023, 53 (09) : 10027 - 10052
  • [34] Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization
    Mira Lefkir
    Farid Nouioua
    Philippe Fournier-Viger
    Applied Intelligence, 2023, 53 : 10027 - 10052
  • [35] Hiding Sensitive Itemsets Using Sibling Itemset Constraints
    Yildiz, Baris
    Kut, Alp
    Yilmaz, Reyat
    SYMMETRY-BASEL, 2022, 14 (07):
  • [36] A Frequent Item Graph Approach for Discovering Frequent Itemsets
    Kumar, A. V. Senthil
    Wahidabanu, R. S. D.
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 952 - +
  • [37] A Novel Fuzzy Frequent Itemsets Mining Approach for the Detection of Breast Cancer
    Dhanaseelan, Ramesh F.
    Jeyasutha, M.
    INTERNATIONAL JOURNAL OF INFORMATION RETRIEVAL RESEARCH, 2021, 11 (01) : 36 - 53
  • [38] Effective algorithms for mining frequent-utility itemsets
    Liu, Xuan
    Chen, Genlang
    Wen, Shiting
    Huang, Jingfang
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (08) : 1533 - 1560
  • [39] A Filtering Approach for Mining Frequent Itemsets
    Huang, Jen-Peng
    Kuo, Huang-Cheng
    OPPORTUNITIES AND CHALLENGES FOR NEXT-GENERATION APPLIED INTELLIGENCE, 2009, 214 : 59 - 63
  • [40] A decomposition approach for mining frequent itemsets
    Huang, Jen-Peng
    Lan, Guo-Cheng
    Ku, Huang-Cheng
    Hong, Tzung-Pei
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 605 - +