Preserving Privacy in Mining Quantitative Associations Rules

被引:1
|
作者
Ahluwalia, Madhu V. [1 ]
Gangopadhyay, Aryya [2 ]
Chen, Zhiyuan [3 ]
机构
[1] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[2] Univ Maryland Baltimore Cty, Informat Syst, Baltimore, MD 21228 USA
[3] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21228 USA
基金
美国国家科学基金会;
关键词
Association Rule Mining; Discrete Wavelet Transform; Privacy Preserving Data Mining;
D O I
10.4018/jisp.2009100101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Association rule mining is an important data mining method that has been studied extensively by the academic community and has been applied in practice. In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This article fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving data mining patterns for association rules. A comparison with an existing kd-tree based transform shows that the DWT-based method fares better in terms of efficiency, preserving patterns, and privacy.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [41] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
  • [42] Privacy Preserving Quantitative Association Rule Mining Using Convex Optimization Technique
    Hatefi, Elham
    Mirzaei, Abdolreza
    Safayani, Mehran
    2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 815 - 820
  • [43] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [44] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Tung-Shou Chen
    Wei-Bin Lee
    Jeanne Chen
    Yuan-Hung Kao
    Pei-Wen Hou
    The Journal of Supercomputing, 2013, 66 : 907 - 917
  • [45] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Chen, Tung-Shou
    Lee, Wei-Bin
    Chen, Jeanne
    Kao, Yuan-Hung
    Hou, Pei-Wen
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 907 - 917
  • [46] Privacy Preserving Utility Mining: A Survey
    Gan, Wensheng
    Chun-Wei, Jerry
    Chao, Han-Chieh
    Wang, Shyue-Liang
    Yu, Philip S.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 2617 - 2626
  • [47] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [48] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [49] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [50] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114