Hiding sensitive itemsets with multiple objective optimization

被引:0
|
作者
Jerry Chun-Wei Lin
Yuyu Zhang
Binbin Zhang
Philippe Fournier-Viger
Youcef Djenouri
机构
[1] Harbin Institute of Technology (Shenzhen),School of Computer Science and Technology
[2] Western Norway University of Applied Sciences,Department of Computing, Mathematics, and Physics
[3] Shenzhen University Health Science Center,Department of Biochemistry and Molecular Biology
[4] Shenzhen University Health Science Center,Center for Anti
[5] Harbin Institute of Technology Shenzhen Graduate School,Aging and Regenerative Medicine
[6] IMADA,School of Natural Sciences and Humanities
[7] Southern Denmark University,undefined
来源
Soft Computing | 2019年 / 23卷
关键词
PPDM; Sanitization; Evolutionary computation; Pre-large concept; Pareto solutions;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy-preserving data mining (PPDM) has become an important research topic, as it can hide sensitive information, while ensuring that information can still be extracted for decision making. While performing the sanitization progress for hiding the sensitive information, three side effects such as hiding failure, missing cost, and artificial cost happen at the same time. Several evolutionary algorithms were introduced to minimize those three side effects of PPDM using a single-objective function that generates one solution for sanitization. This paper presents a multiobjective algorithm (NSGA2DT) with two strategies for hiding sensitive information with transaction deletion based on the NSGA-II framework. To obtain better balance of side effects, the designed NSGA2DT takes database dissimilarity (Dis) as one more factor to achieve better performance in terms of four side effects. Moreover, instead of a single solution of the sanitization progress, the designed NSGA2DT provides more than one solutions than those of single-objective evolutionary algorithms, which shows flexibility to select the most appropriate transactions for deletion depending on user’s preference. A Fast SoRting strategy (FSR) and the pre-large concept are utilized, respectively, in this paper to find the optimized transactions for deletion and speed up the iterative process. Based on the developed NSGA2DT, the set of several Pareto solutions can be easily discovered, thus avoiding the problem of local optimization of single-objective approaches. Besides, the designed NSGA2DT does not require to set initial weights for evaluating the side effects, and thus, the results could not be seriously influenced by the predefined weights. Experimental results show that the proposed NSGA2DT provides satisfactory results with reduced side effects, compared to previous evolutionary approaches with single-objective function.
引用
收藏
页码:12779 / 12797
页数:18
相关论文
共 50 条
  • [11] A border-based approach for hiding sensitive frequent itemsets
    Sun, XZ
    Yu, PS
    FIFTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2005, : 426 - 433
  • [12] Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets
    Wu, Jimmy Ming-Tai
    Zhan, Justin
    Lin, Jerry Chun-Wei
    IEEE ACCESS, 2017, 5 : 10024 - 10039
  • [13] Two new techniques for hiding sensitive itemsets and their empirical evaluation
    HajYasien, Ahmed
    Estivill-Castro, Vladimir
    DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4081 : 302 - 311
  • [14] An efficient algorithm for hiding sensitive-high utility itemsets
    Trieu, Vy Huynh
    Quoc, Hai Le
    Ngoc, Chau Truong
    INTELLIGENT DATA ANALYSIS, 2020, 24 (04) : 831 - 845
  • [15] Efficient privacy preserving algorithms for hiding sensitive high utility itemsets
    Ashraf, Mohamed
    Rady, Sherine
    Abdelkader, Tamer
    Gharib, Tarek F.
    COMPUTERS & SECURITY, 2023, 132
  • [16] Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
    Lin, Chun-Wei
    Zhang, Binbin
    Yang, Kuo-Tung
    Hong, Tzung-Pei
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [17] GA-based Approach for Hiding Sensitive Itemsets by Transaction Insertion
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Chang, Chia-Ching
    Wang, Shyue-Liang
    2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 3 - 9
  • [18] Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Hsu, Hung-Chuan
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [19] A border-based integer programming approach for hiding sensitive frequent itemsets
    Wang, Mingzheng
    He, Yue
    Han, Haishan
    ICIC Express Letters, 2013, 7 (3 B): : 1073 - 1080
  • [20] Hiding Association Rules based on Relative-non-sensitive Frequent Itemsets
    Li, Xueming
    Liu, Zhijun
    Zuo, Chuan
    PROCEEDINGS OF THE 8TH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2009, : 384 - +