Analysis of Privacy Preserving Approaches in High Utility Pattern Mining

被引:4
|
作者
Yun, Unil [1 ]
Kim, Donggyu [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Data mining; Utility pattern mining; High average-utility pattern mining; Stream pattern mining;
D O I
10.1007/978-981-10-3023-9_137
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the significant increase of information sharing in various areas, it has been an important issue to prevent personal information from being disclosed to abnormal users. Pattern mining is one of data mining technique for extracting interesting pattern information from massive databases. Therefore, sensitive patterns belonging to personal information can be disclosed to abnormal users through pattern mining methods. A sanitization approach that modifies a given database is one of the most common approach for achieving privacy preserving. In this paper, we introduce and analyze various methods for achieving privacy preserving in high utility pattern mining based on sanitization approaches.
引用
收藏
页码:883 / 887
页数:5
相关论文
共 50 条
  • [21] Fast privacy-preserving utility mining algorithm based on utility-list dictionary
    Chunyong Yin
    Ying Li
    Applied Intelligence, 2023, 53 : 29363 - 29377
  • [22] Privacy Preserving Frequent Pattern Mining on Multi-Cloud Environment
    Tai, Chih-Hua
    Huang, Jen-Wei
    Chung, Meng-Hao
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 235 - 240
  • [23] Fast privacy-preserving utility mining algorithm based on utility-list dictionary
    Yin, Chunyong
    Li, Ying
    APPLIED INTELLIGENCE, 2023, 53 (23) : 29363 - 29377
  • [24] An improved EMASK algorithm for privacy-preserving frequent pattern mining
    Xu, CF
    Wang, JL
    Dan, HW
    Pan, YH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 752 - 757
  • [25] An Efficient Algorithm for Frequent Pattern Mining based on Privacy-preserving
    Zhang, Yaling
    Wang, Ting
    Wang, Shangping
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [26] Privacy-preserving frequent pattern mining across private Databases
    Fu, AWC
    Wong, RCW
    Wang, K
    Fifth IEEE International Conference on Data Mining, Proceedings, 2005, : 613 - 616
  • [27] Preserving Privacy for Interesting Location Pattern Mining from Trajectory Data
    Ho, Shen-Shyang
    Ruan, Shuhua
    TRANSACTIONS ON DATA PRIVACY, 2013, 6 (01) : 87 - 106
  • [28] ANALYSIS OF PRIVACY PRESERVING ECHANISMS FOR OUTSOURCED DATA MINING
    Agrawal, Khushbu
    Tewari, Vandan
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 572 - 576
  • [29] A novel algorithm for privacy preserving utility mining based on integer linear programming
    Li, Shaoxin
    Mu, Nankun
    Le, Junqing
    Liao, Xiaofeng
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 81 : 300 - 312
  • [30] Efficient algorithms for victim item selection in privacy-preserving utility mining
    Jangra, Shalini
    Toshniwal, Durga
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 219 - 234