Abstract
Earlier, many PPDM algorithms have been proposed to conceal sensitive items in a database in order to disclose sensitive itemsets. All prior techniques, however, ignored a crucial problem in setting minimum support thresholds. Thus, a new concept of minimal support for solving this issue is proposed in this paper. In compliance with a given threshold function, the proposed approach would set a tighter threshold for an object containing several items. Experimental results are then evaluated to show the performance of the traditional Greedy PPDM approach, GA-based PPDM approaches, and the proposed PSO-based algorithm with the new flexible and minimal support function.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: VLDB Conference, pp. 487–499 (1994)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACN SIGMOD International Conference on Management of Data, pp. 439–450 (2000)
Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Workshop on Knowledge and Data Engineering Exchange, pp. 45–52 (1999)
Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: International Workshop on Information Hiding, pp. 369–383 (2001)
Fournier-Viger, P., et al.: The SPMF open-source data mining library version 2. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 36–40 (2016)
Han, S., Ng, W.K.: Privacy-preserving genetic algorithms for rule discovery. In: International Conference on Data Warehousing and Knowledge Discovery, pp. 407–417 (2007)
Holland, J.H., et al.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT Press (1992)
Kennedy, J., Eberhart, R.: Particle swarm optimization. In: International Conference on Neural Networks, vol. 4, pp. 1942–1948 (1995)
Lin, C.W., Hong, T.P., Chang, C.C., Wang, S.L.: A greedy-based approach for hiding sensitive itemsets by transaction insertion. J. Inf. Hiding Multimed. Signal Process. 4(4), 201–227 (2013)
Lin, C.W., Hong, T.P., Hsu, H.C.: Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014, 235837 (2014)
Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210–230 (2015)
Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, 398269 (2014)
Lin, J.C.W., Fournier-Viger, P., Wu, L., Gan, W., Djenouri, Y., Zhang, J.: PPSF: an open-source privacy-preserving and security mining framework. In: IEEE International Conference on Data Mining Workshops, pp. 1459–1463 (2018)
Lin, J.C.W., Liu, Q., Fournier-Viger, P., Hong, T.P., Voznak, M., Zhan, J.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1–18 (2016)
Lin, J.C.W., Pirouz, M., Djenouri, Y., Cheng, C.F., Ahmed, U.: Incrementally updating the high average-utility patterns with pre-large concept. Appl. Intell. 50(11), 3788–3807 (2020)
Lin, J.C.W., Srivastava, G., Zahng, Y., Djenouri, Y., Aloqaily, M.: Privacy preserving multi-objective sanitization model in 6g IoT environments. IEEE Internet Things J. (2020)
Lin, J.C.W., Wu, J.M.T., Fournier-Viger, P., Djenouri, Y., Chen, C.H., Zhang, Y.: A sanitization approach to secure shared data in an IoT environment. IEEE Access 7, 25359–25368 (2019)
Lin, J.C.W., Yang, L., Fournier-Viger, P., Wu, M.T., Hong, T.P., Wang, L.S.L.: A swarm-based approach to mine high-utility itemsets. In: Multidisciplinary Social Networks Research, pp. 572–581 (2015)
Lin, J.C.W., Zhang, Y., Zhang, B., Fournier-Viger, P., Djenouri, Y.: Hiding sensitive itemsets with multiple objective optimization. Soft. Comput. 23(23), 12779–12797 (2019)
Oliveira, S.R., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: International Conference on Privacy, Security and Data Mining, vol. 14, pp. 43–54 (2002)
Srivastava, G., Lin, J.C.W., Zhang, X., Li, Y.: Large-scale high-utility sequential pattern analytics in internet of things. IEEE Internet Things J. (2020)
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1), 50–57 (2004)
Wu, T.Y., Lin, J.C.W., Zhang, Y., Chen, C.H.: A grid-based swarm intelligence algorithm for privacy-preserving data mining. Appl. Sci. 9, 1–20 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, J.MT., Srivastava, G., Tayeb, S., Lin, J.CW. (2021). A PSO-Based Sanitization Process with Multi-thresholds Model. In: Del Bimbo, A., et al. Pattern Recognition. ICPR International Workshops and Challenges. ICPR 2021. Lecture Notes in Computer Science(), vol 12664. Springer, Cham. https://doi.org/10.1007/978-3-030-68799-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-68799-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68798-4
Online ISBN: 978-3-030-68799-1
eBook Packages: Computer ScienceComputer Science (R0)