Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Survey of Various Methodologies for Hiding Sensitive Association Rules

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 18
Year of Publication: 2014
Tapan Sirole
Jaytrilok Choudhary

Tapan Sirole and Jaytrilok Choudhary. Article: A Survey of Various Methodologies for Hiding Sensitive Association Rules. International Journal of Computer Applications 96(18):12-15, June 2014. Full text available. BibTeX

	author = {Tapan Sirole and Jaytrilok Choudhary},
	title = {Article: A Survey of Various Methodologies for Hiding Sensitive Association Rules},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {18},
	pages = {12-15},
	month = {June},
	note = {Full text available}


Data mining and hiding are the future research directions in the field of knowledge engineering. The main challenges in data mining are finding the sensitive association and hide them without revealing sensitive information. The association rule hiding is a process in which the original database is modified in such way that precise sensitive rules are disappeared. In this paper, a survey of various recent approaches of association rule hiding has been described along with the comparison between them.


  • Agarwal and Srikant ,"Privacy-preserving data mining", In ACM SIGMOD, May 2000, pp. 439-450 .
  • R. Agrawal, T. Imielinski, and A. Swami, "Mining Association Rules between Sets of Items in Large Database," Proceedings of the ACM SIGMOD Conference on Management of Data, Washington, D. C. , USA, pp. 207-216, 1993
  • M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. S. Verykios "Disclosure limitation of sensitive rules. "In Proc. of the 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX'99), pp. 45–52, 1999.
  • V. S. Verykios, A. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, "Association rule hiding," IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 4, 434–447, 2004 .
  • Y. Saygin, V. Verykios, and C. Clifton, "Using Unknowns to Prevent Discovery of Association Rules" ACM SIGMOD, Vol. 30, No. 4, pp. 45–54, 2001.
  • Y. Saygin, V. Verykios, and A. Elmagarmid, "Privacy preserving association rule mining," In: Proc. Int'l. Workshop on Research Issues in Data Engineering (RIDE 2002), pp. 151–163, 2002.
  • X. Sun, and P. Yu, "A Border-Based Approach for Hiding Sensitive Frequent Itemsets," In: Proc. Fifth IEEE Int'l. Conf. Data Mining (ICDM 2005), pp. 426–433, 2005.
  • A. Gkoulalas-Divanis, and V. S. Verykios, " Exact knowledge hiding through database extension" IEEE Trans Knowledge Data Eng 2009, pp. 699–713.
  • Gkoulalas-Divanis, Aris, Verykios, Vassilios S. Association Rule Hiding for Data Mining, Springer Series: Advances in Database Systems, Vol. 41, 1st Edition. , 2010, p. 13.
  • Shyue-Liang Wang and Ayat Jafari Using Unknowns for Hiding Sensitive Predictive Association Rules IEEE 2005.
  • Ramesh Chandra Belwal, Jitendra Varshney, Sohel Ahmed Khan, Anand Sharma, Mahua Bhattacharya, "Hiding Sensitive Association Rules Efficiently By Introducing New Variable Hiding counter", IEEE International conference on Service Operations, Logistics and informatics, Vol. 1,Oct. 2008, pp 130-134.
  • C. N. Modi, U. P. Rao, and D. R. Patel, "Maintaining privacy and data quality in privacy preserving association rule mining," 2010 Second Iternational conference on Computing,Communication and Networking Technologies, pp. 1–6, Jul. 2010.
  • N Domadiya and U. P. Rao, "Hiding Sensitive Association Rules to Maintain Privacy and Data Quality in Database" 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 1306-1310, 2013.
  • Chih-Chia Weng; Shan-Tai Chen; Hung-Che Lo, "A Novel Algorithm for Completely Hiding Sensitive Association Rules", IEEE Intelligent Systems Design and Applications, 2008. ,vol 3, pp. 202-208, 2008.
  • Sanjeev Keer and prof. Anju Singh, Hiding Sensitive association Rule using cluster s of sensitive association rule, International Journal of computer science and Network vol. 1 Issue 3,June 2012.