DocumentCode :
588866
Title :
Finding the Provenance of k-anonymous Data and Adding It to Association-rule Mining
Author :
Liu Yilong ; Liu Guohua
Author_Institution :
Comput. Sci. & Technol., Donghua Univ., Shanghai, China
fYear :
2012
fDate :
17-18 Nov. 2012
Firstpage :
117
Lastpage :
122
Abstract :
Provenance of data describes the process of the generation and transformation of the date, which is used in data mining, data verification, data recovery and reference and some other areas. For uncertain data, provenance plays an important role in query and analytical processing. K-anonymous data is a special kind of uncertain data, which is derived according to the generalization tree by the definite data. Thus, generalization tree is an essential part of provenance of the k-anonymous data. Through the analysis of the generation of the k-anonymous data, we propose a formal definition of the generalization tree and the construction algorithm from the perspective of recipients of the data. On that basis, we present an algorithm for mining association-rule on the k-anonymous data. Finally, compared with the experiment mining of original data, we can verify that the new algorithm is feasible, and theoretical performance analysis shows that the new algorithm can greatly reduce the time complexities of mining and improve the efficiency of mining.
Keywords :
data mining; query processing; tree data structures; analytical processing; association-rule mining; data mining; data recovery; data verification; generalization tree; k-anonymous data provenance; performance analysis; query processing; Computational intelligence; Security; association-rule; data provenance; generalization tree; k-anonymity; uncertain data;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security (CIS), 2012 Eighth International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4673-4725-9
Type :
conf
DOI :
10.1109/CIS.2012.34
Filename :
6405879
Link To Document :
بازگشت