Analysis of Privacy Preserving Approaches in High Utility Pattern Mining

被引:4
|
作者
Yun, Unil [1 ]
Kim, Donggyu [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Data mining; Utility pattern mining; High average-utility pattern mining; Stream pattern mining;
D O I
10.1007/978-981-10-3023-9_137
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the significant increase of information sharing in various areas, it has been an important issue to prevent personal information from being disclosed to abnormal users. Pattern mining is one of data mining technique for extracting interesting pattern information from massive databases. Therefore, sensitive patterns belonging to personal information can be disclosed to abnormal users through pattern mining methods. A sanitization approach that modifies a given database is one of the most common approach for achieving privacy preserving. In this paper, we introduce and analyze various methods for achieving privacy preserving in high utility pattern mining based on sanitization approaches.
引用
收藏
页码:883 / 887
页数:5
相关论文
共 50 条
  • [31] A fast perturbation algorithm using tree structure for privacy preserving utility mining
    Yun, Unil
    Kim, Jiwon
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (03) : 1149 - 1165
  • [32] Utility Promises of Self-Organising Maps in Privacy Preserving Data Mining
    Mohammed, Kabiru
    Ayesh, Aladdin
    Boiten, Eerke
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 55 - 72
  • [33] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [34] Privacy Preserving Data Mining
    Journal of Cryptology, 2002, 15 : 177 - 206
  • [35] Privacy preserving classification mining
    Department of Computing and Information Technology, Fudan University, Shanghai 200433, China
    Jisuanji Yanjiu yu Fazhan, 2006, 1 (39-45):
  • [36] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [37] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [38] Privacy-preserving Publication of Mobility Data with High Utility
    Primault, Vincent
    Ben Mokhtar, Sonia
    Brunie, Lionel
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 802 - 803
  • [39] A Survey of Correlated High Utility Pattern Mining
    Almoqbily, Rashad S.
    Rauf, Azhar
    Quradaa, Fahmi H.
    IEEE ACCESS, 2021, 9 : 42786 - 42800
  • [40] ProUM: High Utility Sequential Pattern Mining
    Gan, Wensheng
    Lin, Jerry Chun-Wei
    Zhang, Jiexiong
    Chao, Han-Chieh
    Fujita, Hamido
    Yu, Philip S.
    2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 767 - 773