CFP last date
20 May 2024
Reseach Article

Preventing Disclosure of Sensitive Knowledge by Hiding Inference

by A. S. Syed Navaz, M. Ravi, T. Prabhu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 1
Year of Publication: 2013
Authors: A. S. Syed Navaz, M. Ravi, T. Prabhu
10.5120/10431-5104

A. S. Syed Navaz, M. Ravi, T. Prabhu . Preventing Disclosure of Sensitive Knowledge by Hiding Inference. International Journal of Computer Applications. 63, 1 ( February 2013), 32-38. DOI=10.5120/10431-5104

@article{ 10.5120/10431-5104,
author = { A. S. Syed Navaz, M. Ravi, T. Prabhu },
title = { Preventing Disclosure of Sensitive Knowledge by Hiding Inference },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 1 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number1/10431-5104/ },
doi = { 10.5120/10431-5104 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:02.045616+05:30
%A A. S. Syed Navaz
%A M. Ravi
%A T. Prabhu
%T Preventing Disclosure of Sensitive Knowledge by Hiding Inference
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 1
%P 32-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

'Data Mining' is a way of extracting data or uncovering hidden patterns of information from databases. So, there is a need to prevent the "inference rules" from being disclosed such that the more secure data sets cannot be identified from non-sensitive attributes. This can be done through removing/adding certain item sets in the transactions (Sanitization). The purpose is to hide the Inference rules, so that the user may not be able to discover any valuable information from other non-sensitive data and any organisation can release all samples of their data without the fear of 'Knowledge Discovery In Databases' which can be achieved by investigating frequently occurring item sets, rules that can be mined from them with the objective of hiding them. Another way is to release only limited samples in the new database so that there is no information loss and it also satisfies the legitimate needs of the users. The major problem is uncovering hidden patterns, which causes a threat to the database security. Sensitive data are inferred from non-sensitive data based on the semantics of the application the user has, commonly known as the 'inference problem'. Two fundamental approaches to protect sensitive rules from disclosure are that, preventing rules from being generated by hiding the frequent sets of data items and reducing the importance of the rules by setting their confidence below a user-specified threshold.

References
  1. Agrawal. R. and R. Srikant,(2000), "Privacy Preserving Data Mining", Proc. ACM SIGMOD Conf. , pp. 1-5.
  2. Ahmed K. Elmagarmid, S. Verykios, Bertino Elisa, Yucel Saygin, and Dasseni Elena,(2004), "Association Rule Hiding", IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 4, pp. 434-438.
  3. Atallah. M. , Bertino. E. , A. Elmagarmid, M. Ibrahim and V. Verykios,(1999), "Disclosure Limitation Of Sensitive Rules", Proc. Knowledge and Data Exchange Workshop, pp. 1-6.
  4. Elena Dasseni and Yucel Saygin,(2000), "Purdue University-Center for Education and Research", Information assurance and security, www. dsl. serc. lisc. ernet. in/pub/mask. pdf
  5. Emmanuel Pontikakis and Vassilios Verykios, (2000) "An Experimental Study Of Association Rule Hiding Techniques-Computer Technology Institute", - Research Unit 3 - Athens, Greece, www. statsoft. /textbook/stassrul. html.
  6. Ramakrishnan Srikant,(2000), "Privacy Preserving Data Mining – A Randomization approach", www. almaden. ibm. com/u/srikanth. html.
  7. Thenu. S. , Thulasi. V. , Yoheswari. V. R. ,(2006), "Preventing Disclosure of Sensitive Knowledge By Hiding Inference Rules", NCRTIT conference, pp 1-4
Index Terms

Computer Science
Information Sciences

Keywords

Data mining inference rules knowledge discovery rule mining rule hiding