Abstract
Frequent itemset mining can be used to discover various interesting patterns present in dataset. However, this imposes a great privacy threat when data is shared with other organisations. There are some business critical frequent patterns that are considered as sensitive from organization’s or individual’s perspective because revealing such patterns can disclose confidential information. Privacy preserving data mining (PPDM) provides various techniques to hide sensitive patterns to make sure that they cannot be revealed by applying data mining models on shared datasets. Heuristic based sensitive pattern hiding techniques are widely adopted PPDM techniques due to their fast execution time but causes high side effects. In this paper, we propose a heuristic approach for sensitive pattern hiding based on deletion of Victim items which is named MinMax. In the proposed algorithm, Misses Cost Impact (MCI) value of each tentative Victim item is calculated and item with minimum MCI is selected as Victim item resulting in low Misses Cost. Experimental results on benchmark datasets show that proposed algorithm achieves better data quality with less execution time as compared to existing heuristic based techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aggarwal, C.C., Philip, S.Y.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. ADBS, vol. 34, pp. 11–52. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-70992-5_2
Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference Very Large Databases VLDB, vol. 1215, pp. 487–499 (1994)
Amiri, A.: Dare to share: protecting sensitive knowledge with data sanitization. Decis. Support Syst. 43(1), 181–191 (2007)
Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX 1999) (Cat. No. PR00453), pp. 45–52. IEEE (1999)
Cheng, P., Roddick, J.F., Chu, S.-C., Lin, C.-W.: Privacy preservation through a greedy, distortion-based rule-hiding method. Appl. Intell. 44(2), 295–306 (2015). https://doi.org/10.1007/s10489-015-0671-0
Dai, B.R., Chiang, L.H.: Hiding frequent patterns in the updated database. In: 2010 International Conference on Information Science and Applications, pp. 1–8. IEEE (2010)
Gkoulalas-Divanis, A., Verykios, V.S.: An integer programming approach for frequent itemset hiding. In: Proceedings of the 15th ACM International Conference on Information and Knowledge Management, pp. 748–757. ACM (2006)
Gkoulalas-Divanis, A., Verykios, V.S.: Exact knowledge hiding through database extension. IEEE Trans. Knowl. Data Eng. 21(5), 699–713 (2008)
Jadav, K.B., Vania, J., Patel, D.: Efficient hiding of sensitive association rules for incremental datasets. Int. J. Innov. Adv. Comput. Sci. (IJIACS) (2014)
Kohavi, R., Brodley, C.E., Frasca, B., Mason, L., Zheng, Z.: KDD-cup 2000 organizers’ report: peeling the onion. SIGKDD Explor. 2(2), 86–98 (2000)
Lin, C.W., Hong, T.P., Hsu, H.C.: Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014 (2014)
Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210–230 (2015)
Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, 13 (2014)
Lin, J.C.W., Liu, Q., Fournier-Viger, P., Hong, T.P., Voznak, M., Zhan, J.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1–18 (2016)
Moustakides, G.V., Verykios, V.S.: A maxmin approach for hiding frequent itemsets. Data Knowl. Eng. 65(1), 75–89 (2008)
Oliveira, S.R., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, vol. 14, pp. 43–54. Australian Computer Society, Inc. (2002)
Oliveira, S.R., Zaïane, O.R.: Protecting sensitive knowledge by data sanitization. In: Third IEEE International Conference on Data Mining, pp. 613–616. IEEE (2003)
Öztürk, A.C., Ergenç, B.: Dynamic itemset hiding algorithm for multiple sensitive support thresholds. Int. J. Data Warehous. Min. (IJDWM) 14(2), 37–59 (2018)
Pontikakis, E.D., Theodoridis, Y., Tsitsonis, A.A., Chang, L., Verykios, V.S.: A quantitative and qualitative analysis of blocking in association rule hiding. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 29–30. ACM (2004)
Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. ACM Sigmod Record 30(4), 45–54 (2001)
Saygin, Y., Verykios, V.S., Elmagarmid, A.K.: Privacy preserving association rule mining. In: Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002, pp. 151–158. IEEE (2002)
Sharma, S., Toshniwal, D.: MR-I MaxMin-scalable two-phase border based knowledge hiding technique using MapReduce. Future Gener. Comput. Syst. (2018)
Sun, X., Yu, P.S.: Hiding sensitive frequent itemsets by a border-based approach. J. Comput. Sci. Eng. 1(1), 74–94 (2007)
Wang, S.L., Jafari, A.: Using unknowns for hiding sensitive predictive association rules. In: IRI-2005 IEEE International Conference on Information Reuse and Integration 2005, pp. 223–228. IEEE (2005)
Wu, J.M.T., Zhan, J., Lin, J.C.W.: Ant colony system sanitization approach to hiding sensitive itemsets. IEEE Access 5, 10024–10039 (2017)
Zamani Boroujeni, F., Hossein Afshari, D.: An efficient rule-hiding method for privacy preserving in transactional databases. J. Comput. Inf. Technol. 25(4), 279–290 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Jangra, S., Toshniowal, D. (2020). A Heuristic Approach for Sensitive Pattern Hiding with Improved Data Quality. In: Ceci, M., Loglisci, C., Manco, G., Masciari, E., Ras, Z. (eds) New Frontiers in Mining Complex Patterns. NFMCP 2019. Lecture Notes in Computer Science(), vol 11948. Springer, Cham. https://doi.org/10.1007/978-3-030-48861-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-48861-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-48860-4
Online ISBN: 978-3-030-48861-1
eBook Packages: Computer ScienceComputer Science (R0)