CFP last date
22 April 2024
Reseach Article

Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule

by Divya C. Kalariya, Vinita Shah, Jay Vala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 8
Year of Publication: 2015
Authors: Divya C. Kalariya, Vinita Shah, Jay Vala
10.5120/21721-4870

Divya C. Kalariya, Vinita Shah, Jay Vala . Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule. International Journal of Computer Applications. 122, 8 ( July 2015), 25-28. DOI=10.5120/21721-4870

@article{ 10.5120/21721-4870,
author = { Divya C. Kalariya, Vinita Shah, Jay Vala },
title = { Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 8 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number8/21721-4870/ },
doi = { 10.5120/21721-4870 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:02.596085+05:30
%A Divya C. Kalariya
%A Vinita Shah
%A Jay Vala
%T Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 8
%P 25-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy preservation data mining is novel research area where data mining algorithms are analyzed for their side-effects they done on data privacy. Privacy preservation data mining (PPDM) deals with the problem of hiding the sensitive information while analyzing data. Many techniques are available for PPDM like data distortion, data hiding, rule hiding, data modification etc. Association rule hiding is one of the technique of PPDM. It hides sensitive rules which are generated by association rule generation algorithm before releasing database. This paper discusses different approaches of association rule hiding technique. In this paper, we propose a heuristic algorithm which provides privacy for sensitive rules while ensuring data quality. Proposed algorithm hides as many as possible rules at a time by modifying fewer transactions.

References
  1. Vikram Garg, Anju Singh & Divakar Singh "A Survey of Association Rule Hiding Algorithms" Fourth International Conference on Communication Systems and Network Technologies, IEEE, 2014, pp. 404-407.
  2. Komal Shah, Amit Thakkar & Amit Ganatra "A Study on Association Rule Hiding Approaches" International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-3, February 2012, pp. 72-76.
  3. Khyati B. Jadav, Jignesh Vania & Dhiren R. Patel "A Survey on Association Rule Hiding Methods" International Journal of Computer Applications (0975 – 8887) Volume 82 – No 13, November 2013, pp. 20-25.
  4. R. Natarajan, Dr. R. Sugumar, M . Mahendran, K. Anbazhagan "Design and Implement an Association Rule hiding Algorithm for Privacy Preservation Data Mining" International Journal of Advanced Research in Computer and Communication Engineering(IJARCCE) Vol. 1, Issue 7, September 2012, pp. 486-492.
  5. Shyue-Liang Wang , Bhavesh Parikh, Ayat Jafari "Hiding informative association rule sets" Expert Systems with Applications 33, ELSEVIER, 2007, pp. 316-323.
  6. S. Kasthuri, T. Meyyappan, "Detection of Sensitive Items in Market Basket Database using Association Rule Mining for Privacy Preservation" International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), IEEE, February 2013, pp. 200-203.
  7. F. Shahzad, s. Asghar, "Hiding Sequential Patterns Using FP Growth Technique" International Conference on Computer Networks and Information Technology (ICCNIT), 2011 IEEE, pp. 125-129.
  8. Chirag N. Modi, Udai Pratap Rao, Dhiren R. Patel "Maintaining Privacy and Data Quality in Privacy Preservation Association Rule Mining" Second International conference on Computing, Communication and Networking Technologies, IEEE, 2010, pp. 1-6.
  9. Mr. Pravin R. Ponde , Dr. S. M. Jagade (Ph. D) "Maintaining Privacy and Data Quality to Hide Sensitive items from Database", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 7, July 2014, pp. 253-256.
  10. Shyue-Liang Wang , Bhavesh Parikh, Ayat Jafari "Hiding informative association rule sets" Expert Systems with Applications 33, ELSEVIER, 2007, pp. 316-323.
  11. Divya C. Kalariya, Vinita shah, Jay Vala," A Survey of Association Rule Hiding Approaches for Privacy Preservation Data mining"
  12. Charu C. Aggarwal, Philip S. Yu, Privacy-Preserving Data Mining:Models and Algorithms. Springer Publishing Company Incorporated,2008, pp. 267-286.
  13. Data mining Concepts and Techniques; Jiawei Han and Micheline Kamber; Second Edition, Morgan kaufmann publishers.
  14. Data Mining Techniques; Arun K Pujari; Universities Press.
  15. weka: http://storm. cis. fordham. edu/~gweiss/data-mining/weka-data/supermarket. arff
  16. http://facweb. cs. depaul. edu/mobasher/classes/ect584/weka/associate. html
Index Terms

Computer Science
Information Sciences

Keywords

Data mining privacy preservation data mining (PPDM) Support Confidence Association rule hiding