double clustering method in hiding association rules

نویسندگان

zahra kiani abari

mohammad naderi dehkordi

چکیده

association rules are among important techniques in data mining which are used for extracting hidden patterns and knowledge in large volumes of data. association rules help individuals and organizations take strategic decisions and improve their business processes. extracted association rules from a database contain important and confidential information that if published, the privacy of individuals may be threatened. therefore, the process of hiding sensitive association rules should be performed prior to sharing the database. this is done through changing the database transactions. these changes must be made in such a way that all sensitive association rules are hidden and a maximum number of non-sensitive association rules are extractable from the sanitized database. in fact, a balance is to be established between hiding the sensitive rules and extracting the non-sensitive rules. a new algorithm is presented in this paper to create a balance between preserving privacy and extracting knowledge. the items of sensitive rules are clustered in the proposed algorithm, in order to reduce changes. in fact, reduction of changes and clustering of rules are applied in order to reduce the side effects of the hiding process on non-sensitive rules.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hiding Generalized Association Rules in RDF Databases

One of the important usage of RDF documents is storing semi-structured and structured data for web information systems. But large repositories of data on the web may contain sensitive information that must be protected against unauthorized access. A possible problem, and still not investigated in this documents, is need to balance confidentiality of disclosed data with legitimate needs of the d...

متن کامل

Clustering Association Rules

We consider the problem of clustering two-dimensional association rules in large databases. We present a geometricbased algorithm, BitOp, for performing the clustering, embedded within an association rule clustering system, ARCS. Association rule clustering is useful when the user desires to segment the data. We measure the quality of the segmentation generated by ARCS using the Minimum Descrip...

متن کامل

Retaining Customers Using Clustering and Association Rules in Insurance Industry: A Case Study

This study clusters customers and finds the characteristics of different groups in a life insurance company in order to find a way for prediction of customer behavior based on payment. The approach is to use clustering and association rules based on CRISP-DM methodology in data mining. The researcher could classify customers of each policy in three different clusters, using association rules. A...

متن کامل

Hiding Association Rules by Using Confidence and Support

Large repositories of data contain sensitive information which must be protected against unauthorized access. The protection of the confidentiality of tills information has been a long-term goal for the database security research community and the government statistical agencies. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encount...

متن کامل

Hiding Sensitive XML Association Rules With Supervised Learning Technique

In the privacy preservation of association rules, sensitivity analysis should be reported after the quantification of items in terms of their occurrence. The traditional methodologies, used for preserving confidentiality of association rules, are based on the assumptions while safeguarding susceptible information rather than recognition of insightful items. Therefore, it is time to go one step ...

متن کامل

A Theoretical Approach for Hiding Sensitive Association Rules

Data mining process is used to extract knowledge from the database. Large numbers of data mining tools are available to get the useful information. These tools can be utilized to break the privacy and security of useful sensitive information present in the database. This sensitive information may be personal information, patterns, facts etc. This sensitive information if mined will result in lo...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of advances in computer research

ناشر: sari branch, islamic azad university

ISSN 2345-606X

دوره 7

شماره 1 2016

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023