New Framework in Sensitive Rule Hiding

Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. Privacy preserving data mining is a novel research directi...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Computer Technology and Applications Vol. 3; no. 1; p. 182
Main Authors Naveenkumar, A S, Punithavalli, M
Format Journal Article
LanguageEnglish
Published 01.01.2012
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. Privacy preserving data mining is a novel research direction in data mining and statistical databases, which has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. There have been two types of privacy proposed concerning data mining. The first type of privacy, called output privacy, is that the data is altered so that the mining result will preserve certain privacy. The second type of privacy, called input privacy, is that the data is manipulated so that the mining result is not affected or minimally affected. For output privacy in hiding association rules, current approaches require hidden rules or patterns to be given in advance. However, to specify hidden rules, entire data mining process needs to be executed. For some applications, only certain sensitive rules that contain sensitive items are required to hide. In this work, an algorithm ISSRH (Increase Support Sensitive Rule Hiding) is proposed, to hide the sensitive rules that contain sensitive items, so that sensitive rules containing specified sensitive items on the right hand side of the rule cannot be inferred through association rule mining.
AbstractList Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. Privacy preserving data mining is a novel research direction in data mining and statistical databases, which has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. There have been two types of privacy proposed concerning data mining. The first type of privacy, called output privacy, is that the data is altered so that the mining result will preserve certain privacy. The second type of privacy, called input privacy, is that the data is manipulated so that the mining result is not affected or minimally affected. For output privacy in hiding association rules, current approaches require hidden rules or patterns to be given in advance. However, to specify hidden rules, entire data mining process needs to be executed. For some applications, only certain sensitive rules that contain sensitive items are required to hide. In this work, an algorithm ISSRH (Increase Support Sensitive Rule Hiding) is proposed, to hide the sensitive rules that contain sensitive items, so that sensitive rules containing specified sensitive items on the right hand side of the rule cannot be inferred through association rule mining.
Author Naveenkumar, A S
Punithavalli, M
Author_xml – sequence: 1
  givenname: A
  surname: Naveenkumar
  middlename: S
  fullname: Naveenkumar, A S
– sequence: 2
  givenname: M
  surname: Punithavalli
  fullname: Punithavalli, M
BookMark eNrjYmDJy89LZWLgNDIystQ1M7A05mDgLS7OMgACM3MDSwNDTgY1v9RyBbeixNzU8vyibIXMPIXg1LzizJLMslSFoNKcVAWPzJTMvHQeBta0xJziVF4ozc2g4eYa4uyhW1CUX1iaWlwSn5tZnJyak5OYl5pfWhxvaGxmamhkYmRhaUyCUgBOmDTG
ContentType Journal Article
DBID 7SC
8FD
JQ2
L7M
L~C
L~D
DatabaseName Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2229-6093
EndPage 182
GroupedDBID 7SC
8FD
ALMA_UNASSIGNED_HOLDINGS
JQ2
KQ8
L7M
L~C
L~D
M~E
OK1
ID FETCH-proquest_miscellaneous_13651242893
IngestDate Thu Apr 11 18:24:39 EDT 2024
IsPeerReviewed false
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-proquest_miscellaneous_13651242893
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
content type line 23
ObjectType-Feature-1
PQID 1365124289
PQPubID 23500
ParticipantIDs proquest_miscellaneous_1365124289
PublicationCentury 2000
PublicationDate 20120101
PublicationDateYYYYMMDD 2012-01-01
PublicationDate_xml – month: 01
  year: 2012
  text: 20120101
  day: 01
PublicationDecade 2010
PublicationTitle International Journal of Computer Technology and Applications
PublicationYear 2012
SSID ssj0000670901
Score 3.6731896
Snippet Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining...
SourceID proquest
SourceType Aggregation Database
StartPage 182
SubjectTerms Algorithms
Data mining
Hides
Preserves
Preserving
Privacy
Transforms
Title New Framework in Sensitive Rule Hiding
URI https://search.proquest.com/docview/1365124289
Volume 3
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED_cnnzxW_wmgoggla3tsu5xyMbQbX51sLfSdBmbSge6-uBf713apJUJTl9CGkpKf9fe5S6_ywGcNWTNpnO8LbsuuIUdbnm2E1qNUR0FbgsxlpSc3OvzzsC9GdaG-WGfKrtkLq6izx_zSv4jVRxDuVKW7B8kaybFAeyjfLFFCWO7lIyJnNjW7CqKXDwRHV2RgR6TV3nZmRrL9Jwz1r8HALPVqK7uUIi1q32FZmGD2wSOww_0fl80ObuZh0_vE9QQkxDfMc267hWDCoqdoYMKUikfKvNt8UpavVBrSmfhg0i1XjWtH5QZUHNVPNu6fxe0B91u4LeGfglKTpXol7cPnomHUb5Qo1JdMInKzvsbsJZBwpop2puwIuMtWNfwsEwXbsM5gs8M-GwaMwM-I_BZCv4OXLRb_nXH0s8L8Mei3ZIwlrPkPSD-Hy5-0CF1dqEcz2K5B6ziRSE6iLbrjYQ7irg3HoeCc3Q6IxqO9uH01-kOlrjnEFZzsRxBef6WyGNc_czFiYLtC2oUE4E
link.rule.ids 315,786,790
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=New+Framework+in+Sensitive+Rule+Hiding&rft.jtitle=International+Journal+of+Computer+Technology+and+Applications&rft.au=Naveenkumar%2C+A+S&rft.au=Punithavalli%2C+M&rft.date=2012-01-01&rft.eissn=2229-6093&rft.volume=3&rft.issue=1&rft.spage=182&rft.epage=182&rft.externalDBID=NO_FULL_TEXT