CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Appraisal on Privacy Preserving Mining of Association Rules

by C. Anitha, M. Padmavathamma, M. Sunil Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 5
Year of Publication: 2011
Authors: C. Anitha, M. Padmavathamma, M. Sunil Kumar
10.5120/2279-2951

C. Anitha, M. Padmavathamma, M. Sunil Kumar . An Appraisal on Privacy Preserving Mining of Association Rules. International Journal of Computer Applications. 18, 5 ( March 2011), 28-34. DOI=10.5120/2279-2951

@article{ 10.5120/2279-2951,
author = { C. Anitha, M. Padmavathamma, M. Sunil Kumar },
title = { An Appraisal on Privacy Preserving Mining of Association Rules },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 5 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number5/2279-2951/ },
doi = { 10.5120/2279-2951 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:31.810223+05:30
%A C. Anitha
%A M. Padmavathamma
%A M. Sunil Kumar
%T An Appraisal on Privacy Preserving Mining of Association Rules
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 5
%P 28-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An interesting new direction for data mining research is the development of techniques that incorporate privacy concerns for association rules. In this work, we present a framework for mining association rules from various transactions. These transactions mainly consisting of categorical items, where the data has to preserve privacy of individual transactions. By using uniform randomization, it is feasible to recover association rules, but these rules are in turn be exploited to find privacy breaches. Hence, in this work we clearly analyze the nature of privacy breaches and propose a new class of randomization operators that are much more effective than uniform randomization which was proposed previously. Here we also derive formulae for an unbiased support estimator, which allows us to recover item set supports from randomization data sets. Here we also show how the above derived formulae will be incorporated into mining algorithms. Finally; we provide experimental results that validate the proposed algorithm by applying it to real data sets.

References
  1. N. R. Adam and J. C. Wortman. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515{556, Dec. 1989.
  2. D. Agrawal and C. C. Aggarwal. On the Design and Quanti_cation of Privacy Preserving Data Mining Algorithms. In Proc. of the 20th ACM Symposium on Principles of Database Systems, pages 247{255, Santa Barbara, California, May 2001.
  3. L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone. Classi_cation and Regression Trees. Wadsworth, Belmont, 1984.
  4. Business Week. Privacy on the Net, March 2000.
  5. C. Clifton and D. Marks. Security and privacy implications of data mining. In ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pages 15{19, May 1996. L. Cranor, J. Reagle, and M. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs{Research, April 1999.
  6. L. F. Cranor, editor. Special Issue on Internet Privacy. Comm. ACM, 42(2), Feb. 1999.
  7. The Economist. The End of Privacy, May 1999.
  8. V. Estivill-Castro and L. Brankovic. Data swapping: Balancing privacy against precision in mining for logic rules. In M. Mohania and A. Tjoa, editors, Data Warehousing and Knowledge Discovery DaWaK-99, pages 389{398. Springer-Verlag Lecture Notes in Computer Science 1676, 1999.
  9. European Union. Directive on Privacy Protection, October 1998.
  10. O_ce of the Information and Privacy Commissioner, Ontario. Data Mining: Staking a Claim on Your Privacy, January 1998.
  11. J. R. Quinlan. Induction of decision trees. Machine Learning, 1:81{106, 1986.
  12. A. Shoshani. Statistical databases: Characteristics, problems and some solutions. In VLDB, pages 208{213, Mexico City, Mexico, September 1982.
  13. R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, and A. I. Verkamo. Fast Discovery of Association Rules. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, editors, Advances in Knowledge Discovery and Data Mining, chapter 12, pages 307{328. AAAI/MIT Press, 1996.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Preserving Mining uniform randomization