Javascript must be enabled to continue!
Multi-level high utility-itemset hiding
View through CrossRef
Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business data in the form of transaction databases, data that is also in danger of being stolen. To deal with this, a number of privacy-preserving data mining (PPDM) techniques have been introduced. An important topic in PPDM in the recent years is privacy-preserving utility mining (PPUM). The goal of PPUM is to protect the sensitive information, such as sensitive high-utility itemsets, in transaction databases, and make them undiscoverable for data mining techniques. However, available PPUM methods do not consider the generalization of items in databases (categories, classes, groups, etc.). These algorithms only consider the items at a specialized level, leaving the item combinations at a higher level vulnerable to attacks. The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.
Title: Multi-level high utility-itemset hiding
Description:
Privacy is as a critical issue in the age of data.
Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners.
High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business data in the form of transaction databases, data that is also in danger of being stolen.
To deal with this, a number of privacy-preserving data mining (PPDM) techniques have been introduced.
An important topic in PPDM in the recent years is privacy-preserving utility mining (PPUM).
The goal of PPUM is to protect the sensitive information, such as sensitive high-utility itemsets, in transaction databases, and make them undiscoverable for data mining techniques.
However, available PPUM methods do not consider the generalization of items in databases (categories, classes, groups, etc.
).
These algorithms only consider the items at a specialized level, leaving the item combinations at a higher level vulnerable to attacks.
The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data.
To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms.
Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.
Related Results
Hiding Sensitive Itemsets Using Sibling Itemset Constraints
Hiding Sensitive Itemsets Using Sibling Itemset Constraints
Data collection and processing progress made data mining a popular tool among organizations in the last decades. Sharing information between companies could make this tool more ben...
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
The present study explains how different factors of knowledge hiding (e.g., evasive, playing dumb, and rationalized) influence on team creativity. Drawn on social exchange theory, ...
Cross-Entropy Assisted Optimization Technique for High Utility Itemset Mining from the Transactional Database
Cross-Entropy Assisted Optimization Technique for High Utility Itemset Mining from the Transactional Database
High Utility Itemset Mining (HUIM) is the process of discovering profitable itemsets in a transactional database with a high utility or profit range. This technique is mainly used ...
Why and When Do Employees Hide Their Knowledge?
Why and When Do Employees Hide Their Knowledge?
This study establishes a theoretical and integrative framework for analyzing the relationship between knowledge hiding and task performance. The existing literature indicates that ...
Competition and profit hiding: evidence from banks in China
Competition and profit hiding: evidence from banks in China
Purpose
– The purpose of this paper is to investigate the quality of financial reporting by banks in China, and the profit hiding behavior of banks in particular.
...
Design and Implementation of Automatic Selection of the Most Efficient Itemset Algorithm Based on Spark
Design and Implementation of Automatic Selection of the Most Efficient Itemset Algorithm Based on Spark
The combination of Spark distributed platform and High-Utility Itemset Mining can solve the problem of long running time issue of High-Utility Itemset Mining. In the experiment, we...
Exploring the consequences of knowledge hiding: an agency theory perspective
Exploring the consequences of knowledge hiding: an agency theory perspective
PurposeThe purpose of the study is to explore empirically the consequences of knowledge hiding at the individual level and from the knowledge hiding committers' perspective. Hence,...

