Swapping-based Data Sanitization Method for Hiding Sensitive Frequent Itemset in Transaction Database

被引:0
|
作者
Gunawan, Dedi [1 ]
Nugroho, Yusuf Sulistyo [1 ]
Maryam [1 ]
机构
[1] Univ Muhammadiyah Surakarta, Informat Engn Dept, Surakarta, Indonesia
关键词
Transaction database; data sanitization; data mining; sensitive frequent itemset; swapping-based method; FAST ALGORITHMS; PRIVACY;
D O I
10.14569/IJACSA.2021.0121179
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sharing a transaction database with other parties for exploring valuable information becomes more recognized by business institutions, i.e., retails and supermarkets. It offers various benefits for the institutions, such as finding customer shopping behavior and frequently bought items, known as frequent itemsets. Due to the importance of such information, some institutions may consider certain frequent itemsets as sensitive information that should be kept private. Therefore, prior to handling a database, the institutions should consider privacy preserving data mining (PPDM) techniques for preventing sensitive information breaches. Presently, several PPDM methods, such as item suppression-based methods and item insertion-based methods have been developed. Unfortunately, the methods result in significant changes to the database and induce some side effects such as hiding failure, significant data dissimilarity, misses cost, and artificial frequent itemset occurrence. In this paper, we propose a swapping-based data sanitization method that can hide the sensitive frequent itemset while at the same time it can minimize the side effects of the data sanitization process. Experimental results indicate that the proposed method outperforms existing methods in terms of minimizing the side effects.
引用
收藏
页码:693 / 701
页数:9
相关论文
共 50 条
  • [1] A frequent itemset generation approach in data mining using transaction-labelling dynamic itemset counting method
    Balaram, Ambily
    Raju, Nedunchezhian
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2025, 17 (01)
  • [2] Closed Itemset based Sensitive Pattern Hiding for Improved Data Utility and Scalability
    Makkar, Himanshu
    Toshniwal, Durga
    Jangra, Shalini
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 4026 - 4035
  • [3] Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation
    Xia, Ying
    Huang, Yu
    Zhang, Xu
    Bae, HaeYoung
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 438 - 445
  • [4] Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction
    Li, Shaoxin
    Mu, Nankun
    Le, Junqing
    Liao, Xiaofeng
    COMPUTERS & SECURITY, 2019, 84 : 17 - 34
  • [5] Evaluation of Sensitive Data Hiding Techniques for Transaction Databases
    Makris, Christos
    Markovits, Panagiotis
    10TH HELLENIC CONFERENCE ON ARTIFICIAL INTELLIGENCE (SETN 2018), 2018,
  • [6] MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
    Li, Yu-Chiang
    Yeh, Jieh-Shan
    Chang, Chin-Chen
    ADVANCED ENGINEERING INFORMATICS, 2007, 21 (03) : 269 - 280
  • [7] Solving the Sensitive Itemset Hiding Problem Whilst Minimizing Side Effects on a Sanitized Database
    Lee, Guanling
    Chen, Yi-Chun
    Peng, Sheng-Lung
    Lin, Jyun-Hao
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2011, 223 : 104 - 113
  • [8] Dynamic growing data mining of more frequent itemset in large database
    Computer and Information Engineering Department, Chongqing Jiaotong University, Chongqing 400074, China
    Jisuanji Gongcheng, 2006, 2 (76-78):
  • [9] A sanitization approach for hiding sensitive itemsets based on particle swarm optimization
    Lin, Jerry Chun-Wei
    Liu, Qiankun
    Fournier-Viger, Philippe
    Hong, Tzung-Pei
    Voznak, Miroslav
    Zhan, Justin
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 53 : 1 - 18
  • [10] Frequent Itemset Mining Algorithm based on Sampling Method
    Li, Haifeng
    Zhang, Ning
    Zhang, Yuejin
    PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 852 - 855