New Framework in Sensitive Rule Hiding
Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. Privacy preserving data mining is a novel research directi...
Saved in:
Published in | International Journal of Computer Technology and Applications Vol. 3; no. 1; p. 182 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
01.01.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. Privacy preserving data mining is a novel research direction in data mining and statistical databases, which has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. There have been two types of privacy proposed concerning data mining. The first type of privacy, called output privacy, is that the data is altered so that the mining result will preserve certain privacy. The second type of privacy, called input privacy, is that the data is manipulated so that the mining result is not affected or minimally affected. For output privacy in hiding association rules, current approaches require hidden rules or patterns to be given in advance. However, to specify hidden rules, entire data mining process needs to be executed. For some applications, only certain sensitive rules that contain sensitive items are required to hide. In this work, an algorithm ISSRH (Increase Support Sensitive Rule Hiding) is proposed, to hide the sensitive rules that contain sensitive items, so that sensitive rules containing specified sensitive items on the right hand side of the rule cannot be inferred through association rule mining. |
---|---|
AbstractList | Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. Privacy preserving data mining is a novel research direction in data mining and statistical databases, which has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. There have been two types of privacy proposed concerning data mining. The first type of privacy, called output privacy, is that the data is altered so that the mining result will preserve certain privacy. The second type of privacy, called input privacy, is that the data is manipulated so that the mining result is not affected or minimally affected. For output privacy in hiding association rules, current approaches require hidden rules or patterns to be given in advance. However, to specify hidden rules, entire data mining process needs to be executed. For some applications, only certain sensitive rules that contain sensitive items are required to hide. In this work, an algorithm ISSRH (Increase Support Sensitive Rule Hiding) is proposed, to hide the sensitive rules that contain sensitive items, so that sensitive rules containing specified sensitive items on the right hand side of the rule cannot be inferred through association rule mining. |
Author | Naveenkumar, A S Punithavalli, M |
Author_xml | – sequence: 1 givenname: A surname: Naveenkumar middlename: S fullname: Naveenkumar, A S – sequence: 2 givenname: M surname: Punithavalli fullname: Punithavalli, M |
BookMark | eNrjYmDJy89LZWLgNDIystQ1M7A05mDgLS7OMgACM3MDSwNDTgY1v9RyBbeixNzU8vyibIXMPIXg1LzizJLMslSFoNKcVAWPzJTMvHQeBta0xJziVF4ozc2g4eYa4uyhW1CUX1iaWlwSn5tZnJyak5OYl5pfWhxvaGxmamhkYmRhaUyCUgBOmDTG |
ContentType | Journal Article |
DBID | 7SC 8FD JQ2 L7M L~C L~D |
DatabaseName | Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2229-6093 |
EndPage | 182 |
GroupedDBID | 7SC 8FD ALMA_UNASSIGNED_HOLDINGS JQ2 KQ8 L7M L~C L~D M~E OK1 |
ID | FETCH-proquest_miscellaneous_13651242893 |
IngestDate | Thu Apr 11 18:24:39 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-proquest_miscellaneous_13651242893 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 content type line 23 ObjectType-Feature-1 |
PQID | 1365124289 |
PQPubID | 23500 |
ParticipantIDs | proquest_miscellaneous_1365124289 |
PublicationCentury | 2000 |
PublicationDate | 20120101 |
PublicationDateYYYYMMDD | 2012-01-01 |
PublicationDate_xml | – month: 01 year: 2012 text: 20120101 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | International Journal of Computer Technology and Applications |
PublicationYear | 2012 |
SSID | ssj0000670901 |
Score | 3.6731896 |
Snippet | Data mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years, data mining... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 182 |
SubjectTerms | Algorithms Data mining Hides Preserves Preserving Privacy Transforms |
Title | New Framework in Sensitive Rule Hiding |
URI | https://search.proquest.com/docview/1365124289 |
Volume | 3 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED_cnnzxW_wmgoggla3tsu5xyMbQbX51sLfSdBmbSge6-uBf713apJUJTl9CGkpKf9fe5S6_ywGcNWTNpnO8LbsuuIUdbnm2E1qNUR0FbgsxlpSc3OvzzsC9GdaG-WGfKrtkLq6izx_zSv4jVRxDuVKW7B8kaybFAeyjfLFFCWO7lIyJnNjW7CqKXDwRHV2RgR6TV3nZmRrL9Jwz1r8HALPVqK7uUIi1q32FZmGD2wSOww_0fl80ObuZh0_vE9QQkxDfMc267hWDCoqdoYMKUikfKvNt8UpavVBrSmfhg0i1XjWtH5QZUHNVPNu6fxe0B91u4LeGfglKTpXol7cPnomHUb5Qo1JdMInKzvsbsJZBwpop2puwIuMtWNfwsEwXbsM5gs8M-GwaMwM-I_BZCv4OXLRb_nXH0s8L8Mei3ZIwlrPkPSD-Hy5-0CF1dqEcz2K5B6ziRSE6iLbrjYQ7irg3HoeCc3Q6IxqO9uH01-kOlrjnEFZzsRxBef6WyGNc_czFiYLtC2oUE4E |
link.rule.ids | 315,786,790 |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=New+Framework+in+Sensitive+Rule+Hiding&rft.jtitle=International+Journal+of+Computer+Technology+and+Applications&rft.au=Naveenkumar%2C+A+S&rft.au=Punithavalli%2C+M&rft.date=2012-01-01&rft.eissn=2229-6093&rft.volume=3&rft.issue=1&rft.spage=182&rft.epage=182&rft.externalDBID=NO_FULL_TEXT |