Hiding Sensitive Itemsets Using Sibling Itemset Constraints

نویسندگان

چکیده

Data collection and processing progress made data mining a popular tool among organizations in the last decades. Sharing information between companies could make this more beneficial for each party. However, there is risk of sensitive knowledge disclosure. Shared should be modified such way that relationships would hidden. Since discovery frequent itemsets one most effective tools firms use, privacy-preserving techniques are necessary continuing itemset mining. There two types approaches algorithmic nature: heuristic exact. This paper presents an exact hiding approach, which uses constraints better solution terms side effects minimum distortion on database. creates asymmetric relation original sanitized To lessen hiding, we introduced sibling concept used generating constraints. Additionally, our approach does not require executed before process. gives advantage total running time. We give evaluation algorithm some benchmark datasets. Our results show effectiveness elimination prior time efficient.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sensitive Itemset Hiding in Multi-level Association Rule Mining

-Enormous numbers of intelligent data mining techniques are in usage to discover hidden patterns. Especially Association rule mining has a high impact on business improvement. However mining association rules at multiplelevel may lead to discovery of more specific and concrete knowledge from data. Privacy is needed in order to withstand the business competence. Now-a-days privacy preserving dat...

متن کامل

Hiding Sensitive Frequent Itemsets by a Border-Based Approach

Nowadays, sharing data among organizations is often required during the business collaboration. Data mining technology has enabled efficient extraction of knowledge from large databases. This, however, increases risks of disclosing the sensitive knowledge when the database is released to other parties. To address this privacy issue, one may sanitize the original database so that the sensitive k...

متن کامل

Review on Hiding the Sensitive High Utility Itemsets

The Association Rule Mining is the traditional mining technique which identifies the frequent itemsets from the databases and this technique generates the rules by considering the each items. The traditional association rule mining fails to obtain the infrequent itemsets with higher profit. Since association rule mining technique treats all the items in the database equally by considering only ...

متن کامل

Itemset Support Queries Using Frequent Itemsets and Their Condensed Representations

The purpose of this paper is two-fold: First, we give efficient algorithms for answering itemset support queries for collections of itemsets from various representations of the frequency information. As index structures we use itemset tries of transaction databases, frequent itemsets and their condensed representations. Second, we evaluate the usefulness of condensed representations of frequent...

متن کامل

A Frequent Itemset Hiding Toolbox

Advances in data collection and data storage technologies have given way to the establishment of transactional databases among companies and organizations, as they allow enormous amounts of data to be stored efficiently. Useful knowledge can be mined from these data, which can be used in several ways depending on the nature of the data. Quite often companies and organizations are willing to sha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2022

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym14071453