Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice

被引:0
|
作者
Huynh Trieu Vy [1 ]
Le Quoc Hai [2 ]
Nguyen Thanh Long [2 ]
Truong Ngoc Chau [3 ]
Le Quoc Hieu [4 ]
机构
[1] Pham Van Dong Univ, Informat Technol Fac, Quang Ngai, Vietnam
[2] Quang Tri Teacher Training Coll, Informat Technol Fac, Quang Tri, Vietnam
[3] Da Nang Univ, Informat Technol Fac, Da Nang, Vietnam
[4] Univ Econ & Law, Fac Informat Syst, Ho Chi Minh City, Vietnam
关键词
High utility mining; High utility and frequent itemset; Sensitive high utility and frequent itemset hiding; Privacy-preserving utility mining; ALGORITHMS;
D O I
10.2478/cait-2022-0001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hiding high utility and frequent itemset is the method used to preserve sensitive knowledge from being revealed by pattern mining process. Its goal is to remove sensitive high utility and frequent itemsets from a database before sharing it for data mining purposes while minimizing the side effects. The current methods succeed in the hiding goal but they cause high side effects. This paper proposes a novel algorithm, named HSUFIBL, that applies a heuristic for finding victim item based on the constrained intersection lattice theory. This algorithm specifies exactly the condition that allows the application of utility reduction or support reduction method, the victim item, and the victim transaction for the hiding process so that the process needs the fewest data modifications and gives the lowest number of lost nonsensitive itemsets. The experimental results indicate that the HSUFIBL algorithm achieves better performance than previous works in minimizing the side effect.
引用
收藏
页码:3 / 23
页数:21
相关论文
共 50 条
  • [31] RETRACTED ARTICLE: Utilizing Index-Based Periodic High Utility Mining to Study Frequent Itemsets
    Roy Setiawan
    Dac-Nhuong Le
    Regin Rajan
    Thirukumaran Subramani
    Dilip Kumar Sharma
    Vidya Sagar Ponnam
    Kailash Kumar
    Syed Musthafa Akbar Batcha
    Pankaj Dadheech
    Sudhakar Sengan
    Arabian Journal for Science and Engineering, 2023, 48 : 4123 - 4123
  • [32] Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization
    Lefkir, Mira
    Nouioua, Farid
    Fournier-Viger, Philippe
    APPLIED INTELLIGENCE, 2023, 53 (09) : 10027 - 10052
  • [33] Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization
    Mira Lefkir
    Farid Nouioua
    Philippe Fournier-Viger
    Applied Intelligence, 2023, 53 : 10027 - 10052
  • [34] Utility-based Frequent Itemsets in Data Streams using Sliding Window
    Amballoor, Renji George
    Naik, Shankar B.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 108 - 112
  • [35] RETRACTED: Utilizing Index-Based Periodic High Utility Mining to Study Frequent Itemsets (Retracted Article)
    Setiawan, Roy
    Le, Dac-Nhuong
    Rajan, Regin
    Subramani, Thirukumaran
    Sharma, Dilip Kumar
    Ponnam, Vidya Sagar
    Kumar, Kailash
    Akbar Batcha, Syed Musthafa
    Dadheech, Pankaj
    Sengan, Sudhakar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (03) : 4123 - 4123
  • [36] A Closed Itemset Property based Multi-objective Evolutionary Approach for Mining Frequent and High Utility Itemsets
    Cao, Heng
    Yang, Shangshang
    Wang, Qingren
    Wang, Qijun
    Zhang, Lei
    2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2019, : 3356 - 3363
  • [37] A Robust Technique for Closed Frequent and High Utility Itemsets Mining: Closed-FHUIM
    Ashraf, Muhammad Waheed
    Naeem, M. Asif
    Lee, Heejeong Jasmine
    IEEE ACCESS, 2024, 12 : 196517 - 196532
  • [38] An itemset reduction based multi-objective evolutionary algorithm for mining high-dimensional frequent and high utility itemsets
    Zhang L.
    Li L.
    Yang H.-P.
    Sun X.
    Cheng F.
    Sun X.-Y.
    Su Y.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (10): : 2832 - 2840
  • [39] The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Yang, Kuo-Tung
    Wang, Leon Shyue-Liang
    APPLIED INTELLIGENCE, 2015, 42 (02) : 210 - 230
  • [40] The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion
    Chun-Wei Lin
    Tzung-Pei Hong
    Kuo-Tung Yang
    Shyue-Liang Wang
    Applied Intelligence, 2015, 42 : 210 - 230