Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I

Research Article

Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)

Download
233 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27299-8_52,
        author={Dhyanendra Jain and Pallavi Khatri and Rishi Soni and Brijesh Chaurasia},
        title={Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)},
        proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I},
        proceedings_a={CCSIT PART I},
        year={2012},
        month={11},
        keywords={Privacy preserving data mining Association rule Association rule hiding},
        doi={10.1007/978-3-642-27299-8_52}
    }
    
  • Dhyanendra Jain
    Pallavi Khatri
    Rishi Soni
    Brijesh Chaurasia
    Year: 2012
    Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)
    CCSIT PART I
    Springer
    DOI: 10.1007/978-3-642-27299-8_52
Dhyanendra Jain1,*, Pallavi Khatri1,*, Rishi Soni1,*, Brijesh Chaurasia2,*
  • 1: Institute of Technology and Management
  • 2: ITM University
*Contact email: dhyanendra.jain@gmail.com, pallavi_magic@yahoo.com, rishisoni17@gmail.com, bkchaurasia_itm@gmail.com

Abstract

Association rule mining is an important data-mining technique that finds interesting association among a large set of data items. Since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find otherwise, it may pose a threat to the privacy of discovered confidential information. Such information is to be protected against unauthorized access. Many strategies had been proposed to hide the information. Some use distributed databases over several sites, data perturbation, clustering, and data distortion techniques. Hiding sensitive rules problem, and still not sufficiently investigated, is the requirement to balance the confidentiality of the disclosed data with the legitimate needs of the user. The proposed approach uses the data distortion technique where the position of the sensitive items is altered but its support is never changed. The size of the database remains the same. It uses the idea of representative rules to prune the rules first and then hides the sensitive rules. Advantage of this approach is that it hides maximum number of rules however, the existing approaches fail to hide all the desired rules, which are supposed to be hidden in minimum number of passes. The paper also compares of the proposed approach with existing ones.