Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Hiding Sensitive Itemsets Using Sibling Itemset Constraints

View through CrossRef
Data collection and processing progress made data mining a popular tool among organizations in the last decades. Sharing information between companies could make this tool more beneficial for each party. However, there is a risk of sensitive knowledge disclosure. Shared data should be modified in such a way that sensitive relationships would be hidden. Since the discovery of frequent itemsets is one of the most effective data mining tools that firms use, privacy-preserving techniques are necessary for continuing frequent itemset mining. There are two types of approaches in the algorithmic nature: heuristic and exact. This paper presents an exact itemset hiding approach, which uses constraints for a better solution in terms of side effects and minimum distortion on the database. This distortion creates an asymmetric relation between the original and the sanitized database. To lessen the side effects of itemset hiding, we introduced the sibling itemset concept that is used for generating constraints. Additionally, our approach does not require frequent itemset mining executed before the hiding process. This gives our approach an advantage in total running time. We give an evaluation of our algorithm on some benchmark datasets. Our results show the effectiveness of our hiding approach and elimination of prior mining of itemsets is time efficient.
Title: Hiding Sensitive Itemsets Using Sibling Itemset Constraints
Description:
Data collection and processing progress made data mining a popular tool among organizations in the last decades.
Sharing information between companies could make this tool more beneficial for each party.
However, there is a risk of sensitive knowledge disclosure.
Shared data should be modified in such a way that sensitive relationships would be hidden.
Since the discovery of frequent itemsets is one of the most effective data mining tools that firms use, privacy-preserving techniques are necessary for continuing frequent itemset mining.
There are two types of approaches in the algorithmic nature: heuristic and exact.
This paper presents an exact itemset hiding approach, which uses constraints for a better solution in terms of side effects and minimum distortion on the database.
This distortion creates an asymmetric relation between the original and the sanitized database.
To lessen the side effects of itemset hiding, we introduced the sibling itemset concept that is used for generating constraints.
Additionally, our approach does not require frequent itemset mining executed before the hiding process.
This gives our approach an advantage in total running time.
We give an evaluation of our algorithm on some benchmark datasets.
Our results show the effectiveness of our hiding approach and elimination of prior mining of itemsets is time efficient.

Related Results

An algebraic semigroup method for discovering maximal frequent itemsets
An algebraic semigroup method for discovering maximal frequent itemsets
Abstract Discovering maximal frequent itemsets is an important issue and key technique in many data mining problems such as association rule mining. In the literatur...
Fouille de représentations concises des motifs fréquents à travers les espaces de recherche conjonctif et disjonctif
Fouille de représentations concises des motifs fréquents à travers les espaces de recherche conjonctif et disjonctif
Durant ces dernières années, les quantités de données collectées, dans divers domaines d'application de l'informatique, deviennent de plus en plus importantes. Cela suscite le beso...
Declarative Approaches for Mining Frequent Itemsets over Transactional Databases
Declarative Approaches for Mining Frequent Itemsets over Transactional Databases
Approches déclaratives pour l'extraction des itemsets fréquents à partir des bases de données transactionnelles La fouille de données est une étape primordiale du p...
Cross-Entropy Assisted Optimization Technique for High Utility Itemset Mining from the Transactional Database
Cross-Entropy Assisted Optimization Technique for High Utility Itemset Mining from the Transactional Database
High Utility Itemset Mining (HUIM) is the process of discovering profitable itemsets in a transactional database with a high utility or profit range. This technique is mainly used ...
Parenting and Sibling Relations in Predicting the Development of Personality Traits
Parenting and Sibling Relations in Predicting the Development of Personality Traits
The impacts of sibling relationship quality during childhood are largely unexplored in predicting the development of internalising and externalising behaviour problems. Syntheses o...
Foster care and siblings
Foster care and siblings
Since the 1980s, researchers have explored the role of sibling relationships and the way that they influence child development, including understandings of emotional closeness, att...
Adolescent Siblings’ Suicide Ideation
Adolescent Siblings’ Suicide Ideation
Similarity of suicide ideation in 1,055 full- and half-adolescent sibling pairs was assessed using Add Health. In each of two waves of data, between 10% and 16% of older and 11% an...
Familial concordance of phenotype and microbial variation among siblings with CF
Familial concordance of phenotype and microbial variation among siblings with CF
AbstractThe clinical spectrum of cystic fibrosis (CF) is influenced by the cystic fibrosis transmembrane conductance regulator (CFTR) genotype. However, variable courses of the dis...

Back to Top