DocumentCode :
1787223
Title :
CISA and FISA: Efficient algorithms for hiding association rules based on Consequent and Full Item Sensitivities
Author :
Shahsavari, Amirhosain ; Hosseinzadeh, Shohreh
Author_Institution :
Dept. of Inf. Technol. & Comput. Eng., Azarbaijan Shahid Madani Univ., Tabriz, Iran
fYear :
2014
fDate :
9-11 Sept. 2014
Firstpage :
977
Lastpage :
982
Abstract :
Database sharing is a necessary task for most of the real world organizations in order to take advantages from organizational cooperation or to find out hidden knowledge buried in their databases, so they can make decisions more precisely. This incurs the risk of sensitive knowledge disclosure which may occur due to malicious use of database. In this paper, we propose two heuristic algorithms called CISA and FISA (Consequent and Full Item Sensitivities Algorithms) for hiding sensitive association rules based on new terms called Consequent and Full Item Sensitivities. This algorithm can hide multiple sensitive rules at the same time. To illustrate efficiency of our work, we compare our algorithms with Algo 1.a which is a popular algorithm for hiding association rules.
Keywords :
data encapsulation; data mining; CISA; FISA; consequent and full item sensitivities algorithms; database sharing; hiding association rules; sensitive knowledge disclosure; Algorithm design and analysis; Association rules; Data privacy; Heuristic algorithms; Itemsets; Sensitivity; Association Rule Hiding; Knowledge hiding; Privacy Preserving Data Mining; Sensitive Rules;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunications (IST), 2014 7th International Symposium on
Conference_Location :
Tehran
Print_ISBN :
978-1-4799-5358-5
Type :
conf
DOI :
10.1109/ISTEL.2014.7000844
Filename :
7000844
Link To Document :
بازگشت