CFP last date
20 May 2024
Reseach Article

A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database

by Archana Tomar, Prof. Vineet Richhariya, Prof. R.K. pandey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 16 - Number 5
Year of Publication: 2011
Authors: Archana Tomar, Prof. Vineet Richhariya, Prof. R.K. pandey
10.5120/2008-2708

Archana Tomar, Prof. Vineet Richhariya, Prof. R.K. pandey . A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database. International Journal of Computer Applications. 16, 5 ( February 2011), 23-23. DOI=10.5120/2008-2708

@article{ 10.5120/2008-2708,
author = { Archana Tomar, Prof. Vineet Richhariya, Prof. R.K. pandey },
title = { A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 16 },
number = { 5 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 23-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume16/number5/2008-2708/ },
doi = { 10.5120/2008-2708 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:05.412336+05:30
%A Archana Tomar
%A Prof. Vineet Richhariya
%A Prof. R.K. pandey
%T A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 16
%N 5
%P 23-23
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The recent advancement in data mining technology to analyze vast amount of data has played an important role in several areas of Business processing. Data mining also opens new threats to privacy and information security if not done or used properly. The main problem is that from non-sensitive data, one is able to infer sensitive information, including personal information, fact or even patterns which are generated by any algorithm of data mining. In order to focusing on privacy preserving association rule mining, the simplistic solution to address the problem of privacy is presented. The solution is to survey different aspects which are discussed in the several research papers and after analyzing those research papers conclude a new solution which is best in efficiency and performance. Before analyzing the algorithms, the data structure of database and sensitive association rule mining set have been analyzed to build the more effective model.

References
  1. Agrawal R, Imielinski T, Swami A, “Mining association rules between sets of items in large databasesWashington, DC, 1993, pp.207–216.
  2. Chen M S, Yu P S. Data Mining:An Overview from a Database Perspective [J]. IEEE Trans on Knowledge and Data Engineering, 2004,8(6) :866-883.
  3. M K Reiter. Crowds:Anonymity for Web Transactions[J]. The ACM Transactions on Information and System Security,2005.
  4. R. Agrawal, R. Srikant, “Fast algorithms for mining association rules,”In: Proc. 20th Int’l Conf. Very Large Data Bases, 1994.
  5. Shaofei Wu, Hui Wang, “Research On The Privacy Preserving Algorithm Of Association Rule Mining InCentralized Database,” International Symposiums on Information Processing, 2008.
  6. Vassilios S. Verykios, Elisa Bertino,et al., “State-of-the-art in Privacy Preserving Data Mining,” March 2004, pp.50-57.
  7. Elena Dasseni, Vassilios S. Verykios, Ahmed K.Elmagarmid, and Elisa Bertino, “Hiding Association Rules by using Confidence and Support,” 2001.
  8. Stanley R. M. Oliveira and Osmar R. Zaiane, “Privacy preserving frequent itemset mining, In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining 2002.
  9. E.T. Wang, G. Lee, Y.T. Lin, “A novel method for protecting sensitive knowledge in association rules mining,” 2005.
  10. E.T. Wang, G. Lee, “An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining,” 2008.
  11. S.R.M. Oliveira, O.R. Zaıane, Y. Saygin, “Secure association rule sharing, advances in knowledge discovery and data mining, in: PAKDD2004.
  12. Jun Lin Lin, Yung Wei Cheng, “Privacy preserving itemset mining 2009.
  13. Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J., “Privacy preserving mining of association rules,” 2002.
  14. Rizvi S J, Haritsa J R., “Maintaining data privacy in association rule mining,” August 2002.
  15. Yucel Saygin, Vassilios Verykios, and Chris Clifton, “Using unknowns to prevent discovery of association rules,” 2001.
  16. Yucel Saygin, Vassilios S. Verykios, and Ahmed K. Elmagarmid, “Privacy preserving association rule mining,” 2002.
  17. L. Sweeney, “k-anonymity: a model for protecting privacy”, 2002.
  18. Xiao X, Tao Y, “Personalized privacy preservation”, 2006.
  19. LIU Ming, Xiaojun Ye, “Personalized K-anonymity”, Computer Engineering and Design, Jan.2008.
  20. Rakesh Agrawal and Ramakrishnan Srikant, “Privacy-preserving data mining 2000.
  21. Dakshi Agrawal and Charu C. Aggarwal, 2001.
  22. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya,Xiaodong Lin, Michael Y. Zhu, 2002.
  23. Chris Clinton, „Privacy Preserving Distributed Data Miting”, 2001.
  24. Murat Kantarcioglu, Chris Clinton, IEEE 2003.
  25. Rakesh Agrawal, Ramakrishnan Srikant, “Privacy- Preserving Data Mining”, 2000.
  26. V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, Y. Theodoridis, “State-of-the-art in Privacy Preserving Data Mining”, 2004.
  27. Shipra Agrawal, Vijay Krishnan, Jayant Haritsa, “On Addressing Efficiency Concerns in Privacy Preserving Data Mining”,DB/0310038.
  28. Rakesh Agrawal and Ramakrishnan Srikant, “Privacy-preserving data mining,” 2000.
  29. Dakshi Agrawal and Charu C. Aggarwal, “On the design and quantification of privacy preserving data mining algorithms 2001.
  30. Rizvi S J, Haritsa J R., “Maintaining data privacy in association rule mining,” August 2002.
  31. Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh Agrawal, and Johannes Gehrke, 2002.
  32. Evfimievski A,Srikant R,Agrawal R, et al. 2002.
  33. Rizvi S J, Haritsa J R., “Maintaining data privacy in association rule mining,” In: Proceedings of t he 28th International Conference on Very Large Data Bases , Hong Kong , China , August 2002.
  34. A. Evfimievski, J. Gehrke and R. Srikant, “Limiting Privacy Breaches in Privacy Preserving Data Mining 2003.
  35. A. Sanil, A. Karr, X. Lin, and J. Reiter, “Privacy preserving regression modelling via distributed computation,” 2004 .
  36. Ioannidis, I.; Grama, A, Atallah, M., “A secure protocol for computing dot-products in clustered and distributed environments,” 2002.
  37. Chris Clifton, Murat Kantarcioglou, XiadongLin, and Michael Y. Zhu, “Tools for privacy preserving distributed data mining 2002.
  38. Vaidya, J. & Clifton, C.W., “Privacy preserving association rule mining in vertically partitioned data,” July 2002.
  39. ZongBo Shang; Hamerlinck, J.D., “Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases,”2007. Seventh IEEE
  40. GENG Bo,ZHONG Hong,PENG Jun,WANG Da-gang Temporal Rule Distribution Mining of Privacy-preserving 2008
  41. Shaofei Wu and Hui Wang ,IEEE International Symposiums on Information Processing,2008.
  42. Yongcheng Luo,Yan Zhao and Jiajin Le ,Second International Symposium on Electronic Commerce and Security,2009 IEEE .
  43. Jie Liu and Yifeng XU,2009 Fourth International Conference on Internet Computing for Science and Engineering,IEEE.
  44. Brian, C.S. Loh and Patrick, H.H. Then,2010 Second International Symposium on Data, Privacy, and E-Commerce,IEEE.
  45. Chirag N. Modi, Udai Pratap Rao and Dhiren R. Patel,2010 International Conference on Advances in Communication, Network, and Computing,IEEE.
  46. Wang Yan,Le Jiajin and Huang Dongmei,2010 International Conference on Web Information Systems and Mining,IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Association Rule Mining Privacy Preserving