DocumentCode
3534801
Title
Hiding sensitive association rules efficiently by introducing new variable hiding counter
Author
Belwal, Ramesh Chandra ; Varshney, Jitendra ; Khan, Sohel Ahmed ; Sharma, Anand ; Bhattacharya, Mahua
Author_Institution
I.I.I.T.M., Gwalior
Volume
1
fYear
2008
fDate
12-15 Oct. 2008
Firstpage
130
Lastpage
134
Abstract
We know that large database contain certain information that must be protected against unauthorized access. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. In this paper we discuss confidentiality issues of a broad category of association rules. Two important terms support and confidence are associated with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of confidentiality purposes. There are many approaches to hide certain association rules which take the support and confidence as a base for algorithms ([1, 2, 6] and many more). Our approach is a modification of ISL (increase support of LHS) and DSR (decrease support of RHS) and has some modifications so that it hides any desired association rule as previous work sometimes can not. Our work has the basis of reduction of support and confidence of sensitive rules but in our work we are not editing or disturbing the given database of transactions directly(as it is generally done in previous works) rather we are performing the same task indirectly bye modifying the some new introduced terms associated with database transactions and association rules. These new terms are Mconfidence (modified confidence), Msupport (modified support) and Hiding counter. Our algorithm use some modified definition of support and confidence so that it would hide any desired sensitive association rule without any side effect. Actually we are using the same method (as previously used method) of getting association rules but we are modifying the definitions of support and confidence.
Keywords
authorisation; data mining; transaction processing; association rule hiding; data mining; database transactions; disclosure risk; information security; unauthorized access; Association rules; Clustering algorithms; Counting circuits; Data mining; Data privacy; Information management; Information technology; Protection; Technology management; Transaction databases; Association rule hiding; hiding counter; modified confidence; modified support;
fLanguage
English
Publisher
ieee
Conference_Titel
Service Operations and Logistics, and Informatics, 2008. IEEE/SOLI 2008. IEEE International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-2012-4
Electronic_ISBN
978-1-4244-2013-1
Type
conf
DOI
10.1109/SOLI.2008.4686377
Filename
4686377
Link To Document