IJITCS Vol. 4, No. 4, 8 Apr. 2012
Cover page and Table of Contents: PDF (size: 69KB)
Full Text (PDF, 69KB), PP.54-61
Views: 0 Downloads: 0
Support, Confidence, Representative Rule Sanitization, Distortion
Many strategies had been proposed in the literature to hide the information containing sensitive items. Some use distributed databases over several sites, some use data perturbation, some use clustering and some use data distortion technique. Present paper focuses on data distortion technique. Algorithms based on this technique either hide a specific rule using data alteration technique or hide the rules depending on the sensitivity of the items to be hidden. The proposed approach is based on data distortion technique where the position of the sensitive items is altered but its support is never changed. The proposed approach uses the idea of representative rules to prune the rules first and then hides the sensitive rules. Experimental results show that proposed approach hides the more number of rules in minimum number of database scans compared to existing algorithms based on the same approach i.e. data distortion technique.
Padam Gulwani, "Association Rule Hiding by Positions Swapping of Support and Confidence", International Journal of Information Technology and Computer Science(IJITCS), vol.4, no.4, pp.54-61, 2012. DOI:10.5815/ijitcs.2012.04.08
[1]Vassilios S. Verykios,, Ahmed K. Elmagarmid , Elina Bertino, Yucel Saygin, Elena Dasseni. “Association Rule Hiding”, IEEE Transactions on knowledge and data engineering, Vol.6, NO.4, April 2004.
[2]Shyue-Liang Wang, Yu-Huei Lee, Billis S., Jafari, A. “Hiding sensitive items in privacy preserving association rule mining”, IEEE International Conference on Systems, Man and Cybernetics, Volume 4, 10-13 Oct. 2004 Page(s): 3239 - 3244 .
[3]E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino. “Hiding Association Rules by Using Confidence and Support”, in Proceedings of 4th Information Hiding Workshop, 369-383, Pittsburgh, PA, 2001.
[4]JIAWEI HAN and MICHALINE KAMBER, “Data Mining Concepts and Techniques”, Morgan Kaufman Publishers 2002
[5]Wang S.L., Jafari, A., “Using unknowns for hiding sensitive predictive association rules”, Information Reuse and Integration, Conf, 2005. IRI -2005 IEEE International Conference on 15-17 Aug. 2005. Page(s): 223 - 228.