Differential Evolution Algorithm for Hiding Fuzzy Association Rules Using Mutual Information

نویسندگان

  • K. Sathiyapriya
  • Sudha Sadasivam
چکیده

Data mining is the process of extracting the useful information from the large amount of available data. Association rule mining is a popular tool for discovering useful associations from large amount of data. Once private data is released for mining, it is very difficult to prevent its misuse. Useful associations with hidden information or knowledge that are sensitive to the database owner could be easily exposed using this kind of tool. Therefore it is necessary to hide all the sensitive information that can be mined from the data in the form of association rules before releasing the data. Most of the methods proposed in literature for association rule hiding deals with binary database and few methods for quantitative database suffer with side effects. This paper proposes an approach for hiding sensitive association rules using differential evolution and mutual information. The proposed algorithm hides the rule by decreasing Association Measure of the rule below threshold. Side effects are reduced by choosing the items with higher mutual information. Experimental results on real datasets demonstrate that the proposed method can effectively sanitize the sensitive data with fewer side effects to the nonsensitive data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hiding Sensitive Fuzzy Association Rules Using Weighted Item Grouping and Rank Based Correlated Rule Hiding Algorithm

Extracting knowledge from large amount of data while preserving the sensitive information is an important issue in data mining. Providing security to sensitive data against unauthorized access has been a long term goal for the database security research community. Almost all the research in privacy preservation is limited to binary dataset. Business and scientific data contain both quantitative...

متن کامل

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

An enhanced reliability-oriented workforce planning model for process industry using combined fuzzy goal programming and differential evolution approach

This paper draws on the “human reliability” concept as a structure for gaining insight into the maintenance workforce assessment in a process industry. Human reliability hinges on developing the reliability of humans to a threshold that guides the maintenance workforce to execute accurate decisions within the limits of resources and time allocations. This concept offers a worthwhile point of de...

متن کامل

An Improved Algorithm for Hiding Sensitive Association Rules Using Exact Approach

Many algorithms are proposed by researchers to find association rules which help the users to make strategic decisions to improve the performance of the business or any qualitative organizations. The threat occurs to association rule mining when data or information is required to share to many users to get mutual benefits. Among the existing techniques the exact hiding approaches provides best ...

متن کامل

Image Backlight Compensation Using Recurrent Functional Neural Fuzzy Networks Based on Modified Differential Evolution

In this study, an image backlight compensation method using adaptive luminance modification is proposed for efficiently obtaining clear images.The proposed method combines the fuzzy C-means clustering method, a recurrent functional neural fuzzy network (RFNFN), and a modified differential evolution.The proposed RFNFN is based on the two backlight factors that can accurately detect the compensat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016