Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Association Rule Hiding based on Heuristic Approach by Deleting Item at R. H. S. Side of Sensitive Rule

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 8
Year of Publication: 2015
Authors:
Divya C. Kalariya
Vinita Shah
Jay Vala
10.5120/21721-4870

Divya C Kalariya, Vinita Shah and Jay Vala. Article: Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule. International Journal of Computer Applications 122(8):25-28, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Divya C. Kalariya and Vinita Shah and Jay Vala},
	title = {Article: Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {8},
	pages = {25-28},
	month = {July},
	note = {Full text available}
}

Abstract

Privacy preservation data mining is novel research area where data mining algorithms are analyzed for their side-effects they done on data privacy. Privacy preservation data mining (PPDM) deals with the problem of hiding the sensitive information while analyzing data. Many techniques are available for PPDM like data distortion, data hiding, rule hiding, data modification etc. Association rule hiding is one of the technique of PPDM. It hides sensitive rules which are generated by association rule generation algorithm before releasing database. This paper discusses different approaches of association rule hiding technique. In this paper, we propose a heuristic algorithm which provides privacy for sensitive rules while ensuring data quality. Proposed algorithm hides as many as possible rules at a time by modifying fewer transactions.

References

  • Vikram Garg, Anju Singh & Divakar Singh "A Survey of Association Rule Hiding Algorithms" Fourth International Conference on Communication Systems and Network Technologies, IEEE, 2014, pp. 404-407.
  • Komal Shah, Amit Thakkar & Amit Ganatra "A Study on Association Rule Hiding Approaches" International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-3, February 2012, pp. 72-76.
  • Khyati B. Jadav, Jignesh Vania & Dhiren R. Patel "A Survey on Association Rule Hiding Methods" International Journal of Computer Applications (0975 – 8887) Volume 82 – No 13, November 2013, pp. 20-25.
  • R. Natarajan, Dr. R. Sugumar, M . Mahendran, K. Anbazhagan "Design and Implement an Association Rule hiding Algorithm for Privacy Preservation Data Mining" International Journal of Advanced Research in Computer and Communication Engineering(IJARCCE) Vol. 1, Issue 7, September 2012, pp. 486-492.
  • Shyue-Liang Wang , Bhavesh Parikh, Ayat Jafari "Hiding informative association rule sets" Expert Systems with Applications 33, ELSEVIER, 2007, pp. 316-323.
  • S. Kasthuri, T. Meyyappan, "Detection of Sensitive Items in Market Basket Database using Association Rule Mining for Privacy Preservation" International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), IEEE, February 2013, pp. 200-203.
  • F. Shahzad, s. Asghar, "Hiding Sequential Patterns Using FP Growth Technique" International Conference on Computer Networks and Information Technology (ICCNIT), 2011 IEEE, pp. 125-129.
  • Chirag N. Modi, Udai Pratap Rao, Dhiren R. Patel "Maintaining Privacy and Data Quality in Privacy Preservation Association Rule Mining" Second International conference on Computing, Communication and Networking Technologies, IEEE, 2010, pp. 1-6.
  • Mr. Pravin R. Ponde , Dr. S. M. Jagade (Ph. D) "Maintaining Privacy and Data Quality to Hide Sensitive items from Database", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 7, July 2014, pp. 253-256.
  • Shyue-Liang Wang , Bhavesh Parikh, Ayat Jafari "Hiding informative association rule sets" Expert Systems with Applications 33, ELSEVIER, 2007, pp. 316-323.
  • Divya C. Kalariya, Vinita shah, Jay Vala," A Survey of Association Rule Hiding Approaches for Privacy Preservation Data mining"
  • Charu C. Aggarwal, Philip S. Yu, Privacy-Preserving Data Mining:Models and Algorithms. Springer Publishing Company Incorporated,2008, pp. 267-286.
  • Data mining Concepts and Techniques; Jiawei Han and Micheline Kamber; Second Edition, Morgan kaufmann publishers.
  • Data Mining Techniques; Arun K Pujari; Universities Press.
  • weka: http://storm. cis. fordham. edu/~gweiss/data-mining/weka-data/supermarket. arff
  • http://facweb. cs. depaul. edu/mobasher/classes/ect584/weka/associate. html