Skip to main content

A PSO-Based Sanitization Process with Multi-thresholds Model

  • Conference paper
  • First Online:
Pattern Recognition. ICPR International Workshops and Challenges (ICPR 2021)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 12664))

Included in the following conference series:

Abstract

Earlier, many PPDM algorithms have been proposed to conceal sensitive items in a database in order to disclose sensitive itemsets. All prior techniques, however, ignored a crucial problem in setting minimum support thresholds. Thus, a new concept of minimal support for solving this issue is proposed in this paper. In compliance with a given threshold function, the proposed approach would set a tighter threshold for an object containing several items. Experimental results are then evaluated to show the performance of the traditional Greedy PPDM approach, GA-based PPDM approaches, and the proposed PSO-based algorithm with the new flexible and minimal support function.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: VLDB Conference, pp. 487–499 (1994)

    Google Scholar 

  2. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACN SIGMOD International Conference on Management of Data, pp. 439–450 (2000)

    Google Scholar 

  3. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Workshop on Knowledge and Data Engineering Exchange, pp. 45–52 (1999)

    Google Scholar 

  4. Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: International Workshop on Information Hiding, pp. 369–383 (2001)

    Google Scholar 

  5. Fournier-Viger, P., et al.: The SPMF open-source data mining library version 2. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 36–40 (2016)

    Google Scholar 

  6. Han, S., Ng, W.K.: Privacy-preserving genetic algorithms for rule discovery. In: International Conference on Data Warehousing and Knowledge Discovery, pp. 407–417 (2007)

    Google Scholar 

  7. Holland, J.H., et al.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT Press (1992)

    Google Scholar 

  8. Kennedy, J., Eberhart, R.: Particle swarm optimization. In: International Conference on Neural Networks, vol. 4, pp. 1942–1948 (1995)

    Google Scholar 

  9. Lin, C.W., Hong, T.P., Chang, C.C., Wang, S.L.: A greedy-based approach for hiding sensitive itemsets by transaction insertion. J. Inf. Hiding Multimed. Signal Process. 4(4), 201–227 (2013)

    Google Scholar 

  10. Lin, C.W., Hong, T.P., Hsu, H.C.: Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014, 235837 (2014)

    Google Scholar 

  11. Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210–230 (2015)

    Article  Google Scholar 

  12. Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, 398269 (2014)

    Google Scholar 

  13. Lin, J.C.W., Fournier-Viger, P., Wu, L., Gan, W., Djenouri, Y., Zhang, J.: PPSF: an open-source privacy-preserving and security mining framework. In: IEEE International Conference on Data Mining Workshops, pp. 1459–1463 (2018)

    Google Scholar 

  14. Lin, J.C.W., Liu, Q., Fournier-Viger, P., Hong, T.P., Voznak, M., Zhan, J.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1–18 (2016)

    Article  Google Scholar 

  15. Lin, J.C.W., Pirouz, M., Djenouri, Y., Cheng, C.F., Ahmed, U.: Incrementally updating the high average-utility patterns with pre-large concept. Appl. Intell. 50(11), 3788–3807 (2020)

    Article  Google Scholar 

  16. Lin, J.C.W., Srivastava, G., Zahng, Y., Djenouri, Y., Aloqaily, M.: Privacy preserving multi-objective sanitization model in 6g IoT environments. IEEE Internet Things J. (2020)

    Google Scholar 

  17. Lin, J.C.W., Wu, J.M.T., Fournier-Viger, P., Djenouri, Y., Chen, C.H., Zhang, Y.: A sanitization approach to secure shared data in an IoT environment. IEEE Access 7, 25359–25368 (2019)

    Article  Google Scholar 

  18. Lin, J.C.W., Yang, L., Fournier-Viger, P., Wu, M.T., Hong, T.P., Wang, L.S.L.: A swarm-based approach to mine high-utility itemsets. In: Multidisciplinary Social Networks Research, pp. 572–581 (2015)

    Google Scholar 

  19. Lin, J.C.W., Zhang, Y., Zhang, B., Fournier-Viger, P., Djenouri, Y.: Hiding sensitive itemsets with multiple objective optimization. Soft. Comput. 23(23), 12779–12797 (2019)

    Article  Google Scholar 

  20. Oliveira, S.R., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: International Conference on Privacy, Security and Data Mining, vol. 14, pp. 43–54 (2002)

    Google Scholar 

  21. Srivastava, G., Lin, J.C.W., Zhang, X., Li, Y.: Large-scale high-utility sequential pattern analytics in internet of things. IEEE Internet Things J. (2020)

    Google Scholar 

  22. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1), 50–57 (2004)

    Article  Google Scholar 

  23. Wu, T.Y., Lin, J.C.W., Zhang, Y., Chen, C.H.: A grid-based swarm intelligence algorithm for privacy-preserving data mining. Appl. Sci. 9, 1–20 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jerry Chun-Wei Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, J.MT., Srivastava, G., Tayeb, S., Lin, J.CW. (2021). A PSO-Based Sanitization Process with Multi-thresholds Model. In: Del Bimbo, A., et al. Pattern Recognition. ICPR International Workshops and Challenges. ICPR 2021. Lecture Notes in Computer Science(), vol 12664. Springer, Cham. https://doi.org/10.1007/978-3-030-68799-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68799-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68798-4

  • Online ISBN: 978-3-030-68799-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics