CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Survey of Various Methodologies for Hiding Sensitive Association Rules

by Tapan Sirole, Jaytrilok Choudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 18
Year of Publication: 2014
Authors: Tapan Sirole, Jaytrilok Choudhary
10.5120/16893-6942

Tapan Sirole, Jaytrilok Choudhary . A Survey of Various Methodologies for Hiding Sensitive Association Rules. International Journal of Computer Applications. 96, 18 ( June 2014), 12-15. DOI=10.5120/16893-6942

@article{ 10.5120/16893-6942,
author = { Tapan Sirole, Jaytrilok Choudhary },
title = { A Survey of Various Methodologies for Hiding Sensitive Association Rules },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 18 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number18/16893-6942/ },
doi = { 10.5120/16893-6942 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:05.392824+05:30
%A Tapan Sirole
%A Jaytrilok Choudhary
%T A Survey of Various Methodologies for Hiding Sensitive Association Rules
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 18
%P 12-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data mining and hiding are the future research directions in the field of knowledge engineering. The main challenges in data mining are finding the sensitive association and hide them without revealing sensitive information. The association rule hiding is a process in which the original database is modified in such way that precise sensitive rules are disappeared. In this paper, a survey of various recent approaches of association rule hiding has been described along with the comparison between them.

References
  1. Agarwal and Srikant ,"Privacy-preserving data mining", In ACM SIGMOD, May 2000, pp. 439-450 .
  2. R. Agrawal, T. Imielinski, and A. Swami, "Mining Association Rules between Sets of Items in Large Database," Proceedings of the ACM SIGMOD Conference on Management of Data, Washington, D. C. , USA, pp. 207-216, 1993
  3. M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. S. Verykios "Disclosure limitation of sensitive rules. "In Proc. of the 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX'99), pp. 45–52, 1999.
  4. V. S. Verykios, A. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, "Association rule hiding," IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 4, 434–447, 2004 .
  5. Y. Saygin, V. Verykios, and C. Clifton, "Using Unknowns to Prevent Discovery of Association Rules" ACM SIGMOD, Vol. 30, No. 4, pp. 45–54, 2001.
  6. Y. Saygin, V. Verykios, and A. Elmagarmid, "Privacy preserving association rule mining," In: Proc. Int'l. Workshop on Research Issues in Data Engineering (RIDE 2002), pp. 151–163, 2002.
  7. X. Sun, and P. Yu, "A Border-Based Approach for Hiding Sensitive Frequent Itemsets," In: Proc. Fifth IEEE Int'l. Conf. Data Mining (ICDM 2005), pp. 426–433, 2005.
  8. A. Gkoulalas-Divanis, and V. S. Verykios, " Exact knowledge hiding through database extension" IEEE Trans Knowledge Data Eng 2009, pp. 699–713.
  9. Gkoulalas-Divanis, Aris, Verykios, Vassilios S. Association Rule Hiding for Data Mining, Springer Series: Advances in Database Systems, Vol. 41, 1st Edition. , 2010, p. 13.
  10. Shyue-Liang Wang and Ayat Jafari Using Unknowns for Hiding Sensitive Predictive Association Rules IEEE 2005.
  11. Ramesh Chandra Belwal, Jitendra Varshney, Sohel Ahmed Khan, Anand Sharma, Mahua Bhattacharya, "Hiding Sensitive Association Rules Efficiently By Introducing New Variable Hiding counter", IEEE International conference on Service Operations, Logistics and informatics, Vol. 1,Oct. 2008, pp 130-134.
  12. C. N. Modi, U. P. Rao, and D. R. Patel, "Maintaining privacy and data quality in privacy preserving association rule mining," 2010 Second Iternational conference on Computing,Communication and Networking Technologies, pp. 1–6, Jul. 2010.
  13. N Domadiya and U. P. Rao, "Hiding Sensitive Association Rules to Maintain Privacy and Data Quality in Database" 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 1306-1310, 2013.
  14. Chih-Chia Weng; Shan-Tai Chen; Hung-Che Lo, "A Novel Algorithm for Completely Hiding Sensitive Association Rules", IEEE Intelligent Systems Design and Applications, 2008. ,vol 3, pp. 202-208, 2008.
  15. Sanjeev Keer and prof. Anju Singh, Hiding Sensitive association Rule using cluster s of sensitive association rule, International Journal of computer science and Network vol. 1 Issue 3,June 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Association rule hiding Association rule data mining Privacy preservation.