Distortion-Based Heuristic Sensitive Rule Hiding Method - The Greedy Way

Peng Cheng, Shu-Chuan Chu, Chun-Wei Lin, John Roddick

    Research output: Contribution to conferencePaper

    1 Citation (Scopus)

    Abstract

    Today, people can use various database techniques to discover useful knowledge from large collections of data. However, people also face the risk of disclosing sensitive information to competitor when the data is shared between different organizations. Thus, there is a balance between the legitimate mining need and protection of confidential knowledge when people release or share data. In this paper, we study the privacy preserving in association rule mining. A new distortion-based method was proposed which hides sensitive rules by removing some items in database so as to reduce the support or confidence of sensitive rules below specified thresholds. Aimed at minimizing side effects, the number of sensitive rules and the number of non-sensitive rules supported by each transaction are utilized to sort the transactions and the candidates which contain most sensitive rules and least non-sensitive rules are selected to modify. Comparative experiments on real datasets showed that the new method can achieve satisfactory results with fewer side effects and data loss.

    Original languageEnglish
    Pages77-86
    Number of pages10
    DOIs
    Publication statusPublished - 1 Jan 2014
    EventThe 27th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2014 -
    Duration: 3 Jun 2014 → …

    Conference

    ConferenceThe 27th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2014
    Period3/06/14 → …

    Keywords

    • Association rule hiding
    • Privacy preserving data mining
    • Sensitive association rules
    • Side effects

    Fingerprint Dive into the research topics of 'Distortion-Based Heuristic Sensitive Rule Hiding Method - The Greedy Way'. Together they form a unique fingerprint.

    Cite this