H-FHAUI: Hiding frequent high average utility itemsets

被引:6
|
作者
Le, Bac [1 ,2 ]
Truong, Tin [3 ]
Duong, Hai [3 ]
Fournier-Viger, Philippe [4 ]
Fujita, Hamido [5 ]
机构
[1] Univ Sci, Fac Informat Technol, Dept Comp Sci, Ho Chi Minh City, Vietnam
[2] Vietnam Natl Univ, Ho Chi Minh City, Vietnam
[3] Dalat Univ, Dept Math & Comp Sci, Dalat City, Vietnam
[4] Harbin Inst Technol, Sch Human & Social Sci, Shenzhen, Peoples R China
[5] Iwate Prefectural Univ, Fac Software & Informat Sci, Takizawa, Iwate, Japan
关键词
Privacy-preserving utility mining; Pattern hiding; High average-utility itemset; Upper bound; Weak upper bound; Border approach; EFFICIENT ALGORITHM; SANITIZATION; PATTERNS;
D O I
10.1016/j.ins.2022.07.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
High average-utility itemset mining consists of analyzing a quantitative customer transactional database to identify high average-utility itemsets (HAUIs); that is sets of items that have a high average utility (e.g. profit). Although important information about customers' habits can be revealed by HAUIs, they can expose sensitive information. To address this concern, the problem of hiding frequent HAUIs (FHAUIs) is studied, which is to modify a transaction database to ensure that sensitive FHAUIs cannot be discovered. An algorithm is designed, named H-FHAUI, which relies on an extended border approach based on the support (occurrence frequency) and the average-utility of itemsets. Moreover, to hide all FHAUIs, H-FHAUI utilizes a novel extended lower border named Bd(E)(-) based on weak upper bounds on the average-utility to only hide a small number of FHAUIs. Then, all remaining FHAUIs are also hidden. Besides, H-FHAUI utilizes a novel weight-based strategy named ICS to choose items and transactions to be modified, a novel TIU-VIU structure to quickly update weak upper bounds, and a strategy named DUSWUB to quickly hide FHAUIs while ensuring that the total utility of D is preserved as much as possible. Experimental results show that H-FHAUI outperforms a baseline in terms of runtime, memory usage, and quality of the sanitized database. (C) 2022 Published by Elsevier Inc.
引用
收藏
页码:408 / 431
页数:24
相关论文
共 50 条
  • [31] Maintenance of Discovered High Average-Utility Itemsets in Dynamic Databases
    Zhang, Binbin
    Lin, Jerry Chun-Wei
    Shao, Yinan
    Fournier-Viger, Philippe
    Djenouri, Youcef
    APPLIED SCIENCES-BASEL, 2018, 8 (05):
  • [32] Maintenance algorithm for high average-utility itemsets with transaction deletion
    Lin, Jerry Chun-Wei
    Shao, Yina
    Fournier-Viger, Philippe
    Djenouri, Youcef
    Guo, Xiangmin
    APPLIED INTELLIGENCE, 2018, 48 (10) : 3691 - 3706
  • [33] Maintenance algorithm for high average-utility itemsets with transaction deletion
    Jerry Chun-Wei Lin
    Yina Shao
    Philippe Fournier-Viger
    Youcef Djenouri
    Xiangmin Guo
    Applied Intelligence, 2018, 48 : 3691 - 3706
  • [34] Efficient hiding of confidential high-utility itemsets with minimal side effects
    Lin, Jerry Chun-Wei
    Hong, Tzung-Pei
    Fournier-Viger, Philippe
    Liu, Qiankun
    Wong, Jia-Wei
    Zhan, Justin
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2017, 29 (06) : 1225 - 1245
  • [35] FIMHAUI: Fast Incremental Mining of High Average-Utility Itemsets
    Yildirim, Irfan
    Celik, Mete
    2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP), 2018,
  • [36] A border-based approach for hiding sensitive frequent itemsets
    Sun, XZ
    Yu, PS
    FIFTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2005, : 426 - 433
  • [37] A multi-objective evolutionary approach for mining frequent and high utility itemsets
    Zhang, Lei
    Fu, Guanglong
    Cheng, Fan
    Qiu, Jianfeng
    Su, Yansen
    APPLIED SOFT COMPUTING, 2018, 62 : 974 - 986
  • [38] Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
    Lin, Jerry Chun-Wei
    Wu, Tsu-Yang
    Fournier-Viger, Philippe
    Lin, Guo
    Zhan, Justin
    Voznak, Miroslav
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 55 : 269 - 284
  • [39] A MODIFIED HIDING HIGH UTILITY ITEM FIRST ALGORITHM (HHUIF) WITH ITEM SELECTOR (MHIS) FOR HIDING SENSITIVE ITEMSETS
    Selvaraj, Rajalakshmi
    Kuthadi, Venu Madhav
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (12): : 4851 - 4862