Privacy Preserving Utility Mining Using Sanitization Approach
نویسندگان
چکیده
This thesis is basically designed for privacy preserving utility mining using sanitization approach. In this work itemsets are provided safety using an approach , firstly we will calculate the utility of all itemsets as the product of item cost and its number of transactions, then we will set a threshold utility which will be the average of max and min utility. Now, we will try to reduce the difference between the utility of item and threshold, this can be done by applying a formula generated in new algorithm named as “Privacy Preserving utility Mining Using Sanitization(PPUMUS)” developed by us. Applying this algorithm the difference gets reduce to such an extent now those sensitive items which had greater utility than threshold, cannot be mined. Further in this approach, apply some sort of encryption on the item name so that they appear unintelligent to other users and outsiders and provide password protection. The output of both the approaches is a sanitized database DB’.
منابع مشابه
Data sanitization in association rule mining based on impact factor
Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...
متن کاملA Novel Sanitization Approach for Privacy Preserving Utility Itemset Mining
Data mining plays a vital role in today’s information world wherein it has been widely applied in various business organizations. The current trend in business collaboration demands the need to share data or mined results to gain mutual benefit. However it has also raised a potential threat of revealing sensitive information when releasing data. Data sanitization is the process to conceal the s...
متن کاملFast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
High-Utility Itemset Mining (HUIM) is an extension of frequent itemset mining, which discovers itemsets yielding a high profit in transaction databases (HUIs). In recent years, a major issue that has arisen is that data publicly published or shared by organizations may lead to privacy threats since sensitive or confidential informationmay be uncovered by data mining techniques. To address this ...
متن کاملClassification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitizat...
متن کاملPrivacy and Utility Preserving Task Independent Data Mining
Today’s world of universal data exchange, there is a need to manage the risk of unintended information disclosure. Publishing the data about the individuals, without revealing sensitive information about them is an important problem. K-anonymization is the popular approach used for data publishing. The limitations of Kanonymity were overcome by methods like L-diversity, T-closeness, (alpha, K) ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015