• DocumentCode
    3534801
  • Title

    Hiding sensitive association rules efficiently by introducing new variable hiding counter

  • Author

    Belwal, Ramesh Chandra ; Varshney, Jitendra ; Khan, Sohel Ahmed ; Sharma, Anand ; Bhattacharya, Mahua

  • Author_Institution
    I.I.I.T.M., Gwalior
  • Volume
    1
  • fYear
    2008
  • fDate
    12-15 Oct. 2008
  • Firstpage
    130
  • Lastpage
    134
  • Abstract
    We know that large database contain certain information that must be protected against unauthorized access. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. In this paper we discuss confidentiality issues of a broad category of association rules. Two important terms support and confidence are associated with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of confidentiality purposes. There are many approaches to hide certain association rules which take the support and confidence as a base for algorithms ([1, 2, 6] and many more). Our approach is a modification of ISL (increase support of LHS) and DSR (decrease support of RHS) and has some modifications so that it hides any desired association rule as previous work sometimes can not. Our work has the basis of reduction of support and confidence of sensitive rules but in our work we are not editing or disturbing the given database of transactions directly(as it is generally done in previous works) rather we are performing the same task indirectly bye modifying the some new introduced terms associated with database transactions and association rules. These new terms are Mconfidence (modified confidence), Msupport (modified support) and Hiding counter. Our algorithm use some modified definition of support and confidence so that it would hide any desired sensitive association rule without any side effect. Actually we are using the same method (as previously used method) of getting association rules but we are modifying the definitions of support and confidence.
  • Keywords
    authorisation; data mining; transaction processing; association rule hiding; data mining; database transactions; disclosure risk; information security; unauthorized access; Association rules; Clustering algorithms; Counting circuits; Data mining; Data privacy; Information management; Information technology; Protection; Technology management; Transaction databases; Association rule hiding; hiding counter; modified confidence; modified support;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Service Operations and Logistics, and Informatics, 2008. IEEE/SOLI 2008. IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-2012-4
  • Electronic_ISBN
    978-1-4244-2013-1
  • Type

    conf

  • DOI
    10.1109/SOLI.2008.4686377
  • Filename
    4686377