• DocumentCode
    3633656
  • Title

    Frequent itemsets hiding: A performance evaluation framework

  • Author

    Osman Abul;Harun Gokce;Yagmur Sengez

  • Author_Institution
    Department of Computer Engineering TOBB University of Economics and Technology, Ankara, Turkey
  • fYear
    2009
  • Firstpage
    668
  • Lastpage
    673
  • Abstract
    Sensitive knowledge hiding is an essential requirement to prevent disclosure of any sensitive knowledge holding in shared databases. The security of a database may be risked when it is made public as is: because the data mining tools are so sophisticated that the sensitive knowledge can easily be surfaced by receivers. This gives rise to a sanitization process which transforms the original database into another database, the released one, which does not hold the sensitive knowledge but can substitute the original otherwise. In case the sensitive knowledge is of the form frequent itemsets, the resulting concrete problem is called frequent itemsets hiding. A number of algorithms, exploiting different approaches and techniques, for frequent itemsets hiding problem is proposed in the literature. Since finding optimal solutions is NP-Hard, algorithms resort to certain heuristics having different levels of sophistication, complexity, efficiency and effectiveness. This paper presents an evaluation framework which implements recent algorithms belonging to different approaches and a set of metrics to gauge the performance and problem difficulties. The current work also presents an experimental study and its results where four algorithms and seven datasets are involved. Our results indicate that data distortion levels and runtime requirements are quite high, especially for difficult problem instances. Our conclusion is that there are new rooms for more sophisticated and tuneable (w.r.t. effectiveness/efficiency tradeoff) algorithms.
  • Keywords
    "Itemsets","Databases","Data privacy","Data mining","Algorithm design and analysis","Data engineering","Knowledge engineering","Data security","Concrete","Runtime"
  • Publisher
    ieee
  • Conference_Titel
    Computer and Information Sciences, 2009. ISCIS 2009. 24th International Symposium on
  • Print_ISBN
    978-1-4244-5021-3
  • Type

    conf

  • DOI
    10.1109/ISCIS.2009.5291903
  • Filename
    5291903