SlideShare a Scribd company logo
1 of 7
Download to read offline
Sundarapandian et al. (Eds): CoNeCo,WiMo, NLP, CRYPSIS, ICAIT, ICDIP, ITCSE, CS & IT 07,
pp. 373–379, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2436
NEW ALGORITHM FOR SENSITIVE RULE
HIDING USING DATA DISTORTION TECHNIQUE
Kasthuri S1
and Meyyappan T2
1
Lecturer, Swami Dayananda College of Arts and Science, Manjakkudi
Kasthu.s@gmail.com
2
Professor, Alagappa University, Karaikudi.
Meyslotus@yahoo.com
ABSTRACT
Data mining is the process of extracting hidden patterns of data. Association rule mining is an
important data mining task that finds interesting association among a large set of data item. It
may disclose pattern and various kinds of sensitive information. Such information may be
protected against unauthorized access. Association rule hiding is one of the techniques of
privacy preserving data mining to protect the association rules generated by association rule
mining. This paper adopts data distortion technique for hiding sensitive association rules.
Algorithms based on this technique either hide a specific rule using data alteration technique or
hide the rules depending on the sensitivity of the items to be hidden. In the proposed technique,
positions of sensitive items are altered while maintaining the support. The proposed technique
uses the idea of representative rules to prune the rules first and then hides the sensitive rules.
KEYWORDS
Association Rule Hiding, Data Mining, Privacy Preserving Data Mining, Distortion,
Representative Rule.
1. INTRODUCTION
Data mining is a knowledge discovery process of analyzing data from different point of views and
to work out into useful patterns. These patterns represent knowledge and are expressed in
decision trees, clusters or association rules. The problem of data mining is that from non-sensitive
data one is able to infer sensitive information including personal information facts or even
patterns that are not supposed to be disclosed. For example the market basket database which is
used to analyze customers purchasing behavior represented in the form of association rules. The
disclosure of this business information or any knowledge extracted from the data may potentially
reveal sensitive trade secrets, whose knowledge can provide a significant advantage to business
competitors and thus can cause the data owner to lose business over his or her peers [10].
Privacy preserving data mining is a major research area for protecting sensitive data or
knowledge. Association rule hiding is one of the privacy preserving techniques to hide sensitive
association rules. All association rule hiding algorithm aims to minimally modify the original
database such that no sensitive association rule is derived from it.
Next section describes the association rule mining. Section 3 explains classes of association rule
hiding algorithms. Section 4 presents the statement of the problem. Section 5 contains the related
work on heuristic approaches based on data distortion technique. Section 6 presents the analysis
of existing work. Section 6 presents the proposed algorithm for sensitive rule hiding. Section 8
374 Computer Science & Information Technology ( CS & IT )
shows the examples demonstrating the algorithm. Concluding remarks and future works are
described in section 9.
2. ASSOCIATION RULE MINING
Let I = {i1,…., in} be a set of items. Let D be a set of transactions or database. Each transaction t
Є D is an item set such that t is a proper subset of I. A transaction t supports X, a set of items in I,
if X is a proper subset of t. Assume that the items in a transaction or an item set are sorted in
lexicographic order. An association rule is an implication of the form X Y, where X and Y are
subsets of I and X∩Y= Ø. The support of rule X Y can be computed by the following equation:
Support(X Y) = |X Y| / |D|, where |X Y| denotes the number of transactions in the database
that contains the itemset XY, and |D| denotes the number of the transactions in the database D.
The confidence of rule is calculated by following equation: Confidence(X Y) = |X Y|/|X|,
where |X| is number of transactions in database D that contains itemset X. A rule X Y is strong
if support(X Y) ≥ min_support and confidence(X Y) ≥ min_confidence, where min_support
and min_confidence are two given minimum thresholds.
Association rule mining algorithms scan the database of transactions and calculate the support
and confidence of the rules and retrieve only those rules having support and confidence higher
than the user specified minimum support and confidence threshold. Association rule hiding
algorithms prevents the sensitive rules from being disclosed. The problem can be stated as
follows: “Given a transactional database D, minimum confidence, minimum support and a set R
of rules mined from database D. A subset RH of R is denoted as set of sensitive association rules
which are to be hidden. The objective is to transform D into a database D‟ in such a way that no
association rule in RH will be mined and all non sensitive rules in R could still be mined from D‟.
3. CLASSES OF ASSOCIATION RULE HIDING ALGORITHMS
Association rule hiding algorithms can be divided into three distinct classes, namely heuristic
approaches, border-based approaches and exact approaches. The first class of approaches
involves efficient, fast algorithms that selectively sanitize a set of transactions from the database
to hide the sensitive knowledge. Due to their efficiency and scalability, the heuristic approaches
have been the focus of attention for the vast majority of researchers in the knowledge hiding field.
However, there are several circumstances in which they suffer from undesirable side-effects that
lead them to suboptimal solutions. The second set of approaches considers the task of sensitive
rule hiding through modification of the original borders in the lattice of the frequent and the
infrequent patterns in the dataset. In these schemes, the sensitive knowledge is hidden by
enforcing the revised borders (which accommodate the hiding of the sensitive itemsets) in the
sanitized database. The algorithms in this class differ both in the borders that they track and use
for the hiding strategy, and in the methodology that they follow to enforce the revised borders in
the sanitized dataset. Finally, the third class of approaches contains non-heuristic algorithms
which conceive the hiding process as a constraint satisfaction problem that they solve by using
integer or linear programming.
4. PROBLEM STATEMENT
The expression data mining indicates a wide range of tools and techniques to extract useful
information which can be sensitive from a large collection of data. Data should be manipulated or
distorted in such a way that information cannot be discovered through data mining techniques.
While dealing with sensitive information it becomes very important to protect data against
unauthorized access. The key problem faced is the need to balance the confidentiality of the
disclosed with the legitimate needs of the data user. The proposed approach is based on
modifying the database transaction.
Computer Science & Information Technology ( CS & IT ) 375
5. PREVIOUS WORK
In Distortion Based Technique (Proposed By Veryki- os Et Al, Etc.) work [1] authors propose
strategies and a suite of algorithms for hiding sensitive knowledge from data by minimally
perturbing their values. In order to achieve this, transactions are modified by removing some
items, or inserting some new items depending on the hiding strategy
In Distortion based Technique on the basis of sensitive item (proposed by shyue-liang wang et
al.) proposed in this work tries to hide certain specific items that are sensitive and proposes two
algorithms to modify data in the Dataset. Concept of this paper says that if the sensitive item is on
the LHS of the rule then increase its support and if the sensitive item is on the right of the rule
then decrease its support.
6. ANALYSIS OF EXISTING TECHNIQUES
Approach in [1] tries to hide every single rule without checking if rules can be pruned after some
transactions have been changed. Approach in [2] definitely hides all the rules which has sensitive
items either in the left or in the right and for this it runs two different algorithms one if sensitive
item is on the LHS and another is the sensitive item is on the RHS i.e. it fails to hide all the rules
containing sensitive item and takes more number of passes to prune all the rules containing
sensitive items.
7. PROPOSED APPROACH
The proposed approach selects all the association rules containing sensitive items either in the left
or in the right from the set of all association rules generated from a dataset. Then these rules are
represented in representative rules (RR) format with sensitive item on the LHS/RHS of the rules.
Select a rule from the set of RR’s, which has sensitive item on the LHS/RHS of the rule. Select a
transaction that completely support RR i.e. it contains all the items in the RR. Based on this a new
approach for modifying database without changing the support of the sensitive item and still
maintaining the secrecy of sensitive data has been proposed.
7.1 Representative Association Rule
Generally, number of association rules discovered in a given database is very large. It is observed
that a considerable percentage of these rules are redundant and useless. A user should be
presented with all of them, which are original, novel, and interesting. To address this issue, [6]
introduced a notion for concise (loss less) representation of association rules, called representative
rules (RR). RR is a least set of rules that allow deducing all association rules without accessing a
database. In a notion of cover operator was introduced for driving a set of association rules from a
given association rule. The cover of the rule X=>Y, Y ≠φ, is defined as follows:
C(X => Y) = {X ∪Y=>V Ζ , V ⊆Y and Z ∩ V = φ and V ≠φ}
Each rule in C (X⇒Y ) consists of a subset of items occurring in the rule X ⇒ Y. The number of
different rules in the cover of the association X ⇒ Y is equal to 3m
– 2m
, m = |Y|.
In general, the process of generating representative rules may be decomposed in to two sub
processes: frequent item-sets generations and generation of RR from frequent item-sets. Let be a
frequent itemset and φ ≠ X⊂Y . The association rule X⇒Ζ /X is representative rule if there is no
376 Computer Science & Information Technology ( CS & IT )
association rule ( X⇒Ζ ′/ X)′ where Z⊂ Ζ′, and there is no association rule (X ′⇒Ζ / X′) such that
X⊃X ′. Formally, a set of representative rules (RR) for a given association rules (AR) can be
defined as follows:
RR= { r∈ΑR ¬∃ r’∈AR, r ’≠ r and r∈ C(r’)}
Each rule in RR is called representative association rule and no representative rule may belong in
the cover of another association rule [8], [9].
The proposed algorithm gives a modified dataset after distorting the database. Input to this
algorithm is a Database, value of min_support, min_confidence, and a set of sensitive items. This
algorithm computes the large item sets of all the sizes from the given dataset. Then it selects all
the rules, which contain sensitive item from the association rules generated. The rules containing
sensitive items are represented in the representative rules format and then the sensitive item is
deleted from a transaction, which fully supports the selected RR and added to a transaction, which
partially supports RR. The detailed steps is given below
Algorithm: Hiding Of Sensitive Association Rules Using Support and Confidence
Input:
(1) D: A source database
(2) min_supp : A min_support.
(3) min_conf : A min_confidence.
(4) H: A set of sensitive items.
Output:
A transformed database D’ where rules containing H on RHS/LHS will be hidden
1. Find all large item sets from D;
2. For each sensitive item h∈ H {
3. If h is not a large item set then H=H- {h};
4. If H is empty then EXIT;
5. Select all the rules with min_supp containing h and store in U//h can either be on LHS or RHS
6. Repeat {
7. Select all the rules from U with same LHS
8. Join RHS of selected rules and store in R; //make representative rules
9. }Until (U is empty);
10.Sort R in descending order by the number of supported items;
11. Select a rule r from R
12.Compute confidence of rule r.
13.If conf>min_conf then {//change the position of sensitive item h.
14.Find T1={t in D|t completely supports r ;
15. If t contains x and h then
16.Delete h from t
17.Find T1={t in D|t does not support LHS(r) and Partially supports x;
18.Add h to t
19. Repeat
20. {
21. Choose the first rule from U;
22. Compute confidence of r;
23. } Until(U is empty);
24. }//end of if conf>min_conf
Computer Science & Information Technology ( CS & IT ) 377
25. Else
26. Go to step 11;
27. Update D with new transaction t;
28. Remove h from H;
29. Go to step 2;
30.}//end of for each h∈ H
Steps of the algorithm are given below:
1. Selects all the rules containing sensitive item(s) either in the left or in the right.
2. Convert these rules in representative rules (RR) format.
3. Selects a rule from the set of RR’s, which has sensitive item on the left of the RR is
selected.
4. Deletes the sensitive item(s) from the transaction that completely supports the RR i.e. it
contained all the items in of RR selected and add the same sensitive item to a transaction
which partially supports RR i.e. where items in RR are absent or only one of them is
present.
5. Recomputed the confidence of the rules in U.
8. IMPLEMENTATION OF THE PROPOSED ALGORITHM
The proposed algorithm can be illustrated with the following example for a given set of
transactional data in Table -1
Table -1: Transactional Dataset1
TID ITEMS
T1 ABC
T2 ABCD
T3 BCE
T4 ACDE
T5 DE
T6 AB
For the Dataset given in Table - 1 at a min_supp of 33% and a min_conf of 70 % and sensitive
item H={C} we choose all the rules containing ‘C’ either in RHS or LHS and represent them in
representative rule format. Out of the 8 association rules the rules containing sensitive items are 6
as shown in Table 2
Table - 2: Sensitive association rules (w.r.t sensitive item C)
AR SUPP CONF
A => C 50 75
C => A 50 75
A, D => C 33.333 100
C, D => A 33.333 100
B => C 50 75
C => B 50 75
From this rules set select the rules that can be represented in the form of representative rules Like
C=> A and C=>B can be represented as C=> AB Now delete C from a transaction where ABC all
the three are present and add C to a transaction where A and B both are absent or only one of
them is present. For this we change transaction T2 to ABD and transaction T5 to CDE. This
378 Computer Science & Information Technology ( CS & IT )
results in changing the position of the sensitive item without changing its support. This is shown
in Table 3.
Table-3: Modified Dataset1 for the proposed Approach (Sensitive Item – C)
TID ITEMS
T1 ABC
T2 ABD
T3 BCE
T4 ACDE
T5 CDE
T6 AB
The new set of association rules generated from this modified dataset is shown in Table-4.
Table-4: Association rules remaining unhidden after modifying the Dataset1
AR SUPP CONF
B=> A 50 75
A=> B 50 75
i.e. all the rules of the original association rules set containing sensitive items on the LHS or on
the RHS are hidden.
9. CONCLUSIONS
In this paper, we presented the database privacy problems caused by data mining technology.
Association rule mining is an important data mining task that finds interesting association among
a large set of data item. It may disclose pattern and various kinds of sensitive information. Such
information may be protected against unauthorized access.
The main aim of this work is to propose a new method to hide the sensitive association rules.
Data will be distorted in such a way that sensitive information cannot be discovered through data
mining techniques. The proposed work analyses the existing techniques and gives their
limitations.
The proposed method uses the idea of representative rules. The confidence of the sensitive rules
will be reduced but the support remains the same. It doesn’t modify the database transactions.
This method will hide all the rules containing the sensitive items. Example demonstrating the
proposed algorithm is shown.
In the proposed method, the confidence of the rule is computed and it is represented as
representative rules. After hiding the sensitive rules the confidence of RR is again computed even
if it falls below the min_conf threshold. So it has to be avoided in the future.
Computer Science & Information Technology ( CS & IT ) 379
REFERENCES
[1] Vassilios S. Verykios,, Ahmed K. Elmagarmid , Elina Bertino, Yucel Saygin, Elena Dasseni.
“Association Rule Hiding”, IEEE Transactions on knowledge and data engineering, Vol.6, NO.4,
April 2004
[2] Shyue-Liang Wang, Yu-Huei Lee, Billis S., Jafari, A. “Hiding sensitive items in privacy preserving
association rule mining”, IEEE International Conference on Systems, Man and Cybernetics, Volume
4, 10-13 Oct. 2004 Page(s): 3239 - 3244 .
[3] E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino. “Hiding Association Rules by Using
Confidence and Support”, in Proceedings of 4th Information Hiding Workshop, 369-383, Pittsburgh,
PA, 2001.
[4] JIAWEI HAN and MICHALINE KAMBER, “Data Mining Conceptsd And Techniques”, Morgon
Kaufman Publishers 2002
[5] Wang. S.L., Jafari, A. “Using unknowns for hiding sensitive predictive association rules”,
Information Reuse and Integration, Conf, 2005. IRI -2005 IEEE International Conference on. 15-17
Aug. 2005 Page(s): 223 - 228.
[6] Marzena Kryszkiewicz. “Representative Association Rules”, In proceedings of PAKDD’98,
Melbourne,Australia(Lecture notes in artificialIntelligence,LANI 1394, Springer-Verleg,1998,pp 198-
209.
[7] Yucel Saygin, Vassilios S. Verykios, Chris Clifton. “Using unknowns to prevent discovery of
association rules”, ACM SIGMOD Record Volume 30 Issue 4, pp. 45 - 54 , (2001)
[8] Yiqun Huang, Zhengding Lu, Heping Hu, “A method of security improvement for privacy preserving
association rule mining over vertically partitioned data”, 9th International Database Engineering and
Application Symposium, pp. 339 – 343, (2005)
[9] Saygin Y., Verykios V.S. and Elmagarmid A.K., “Privacy preserving association rule mining,” IEEE
Proceedings of the 12th Int’l Workshop on Research Issues in Data Engineering, pp. 151 – 158,
(2002)
[10] Aris Gkoulalas–Divanis;Vassilios S. Verykios “Association Rule Hiding For Data Mining” Springer,
DOI 10.1007/978-1-4419-6569-1, Springer Science + Business Media, LLC 2010

More Related Content

What's hot

A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 
An Enhanced Approach of Sensitive Information Hiding
An Enhanced Approach of Sensitive Information HidingAn Enhanced Approach of Sensitive Information Hiding
An Enhanced Approach of Sensitive Information Hidingijsrd.com
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...IJECEIAES
 
A Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining MethodologiesA Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining MethodologiesIOSR Journals
 
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...IOSR Journals
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distanceAn apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distanceIJDKP
 
Classification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining techniqueClassification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining techniqueeSAT Publishing House
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningIRJET Journal
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for InsuranceNIIT Technologies
 
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...IOSR Journals
 
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and PrivacyA Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacyijsrd.com
 
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...IJDKP
 
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset CreationTop Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset Creationcscpconf
 

What's hot (19)

A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
An Enhanced Approach of Sensitive Information Hiding
An Enhanced Approach of Sensitive Information HidingAn Enhanced Approach of Sensitive Information Hiding
An Enhanced Approach of Sensitive Information Hiding
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
 
A Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining MethodologiesA Survey on Fuzzy Association Rule Mining Methodologies
A Survey on Fuzzy Association Rule Mining Methodologies
 
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distanceAn apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distance
 
F1803033843
F1803033843F1803033843
F1803033843
 
Classification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining techniqueClassification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining technique
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
 
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
 
50120130405016 2
50120130405016 250120130405016 2
50120130405016 2
 
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and PrivacyA Rule based Slicing Approach to Achieve Data Publishing and Privacy
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
 
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
 
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset CreationTop Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
 

Similar to NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE

Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Dhyanendra Jain
 
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic AlgorithmOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic Algorithmijcsit
 
Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...IOSR Journals
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesijctet
 
DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...
DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...
DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...IJDKP
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIJSRD
 
Association rule mining.pptx
Association rule mining.pptxAssociation rule mining.pptx
Association rule mining.pptxmaha797959
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...Editor IJMTER
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Dataijtsrd
 
Agrawal association rules
Agrawal association rulesAgrawal association rules
Agrawal association rulesThuy Lan
 
Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase dannyijwest
 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASEIJwest
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGijdkp
 

Similar to NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE (20)

F04713641
F04713641F04713641
F04713641
 
Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.
 
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic AlgorithmOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic Algorithm
 
Dy33753757
Dy33753757Dy33753757
Dy33753757
 
Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...
 
K017167076
K017167076K017167076
K017167076
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniques
 
DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...
DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...
DISCOVERY OF ACTIONABLE PATTERNS THROUGH SCALABLE VERTICAL DATA SPLIT METHOD ...
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its Methods
 
Association rule mining.pptx
Association rule mining.pptxAssociation rule mining.pptx
Association rule mining.pptx
 
Hl2513421351
Hl2513421351Hl2513421351
Hl2513421351
 
Hl2513421351
Hl2513421351Hl2513421351
Hl2513421351
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
 
Agrawal association rules
Agrawal association rulesAgrawal association rules
Agrawal association rules
 
Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase
 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
 
F0423038041
F0423038041F0423038041
F0423038041
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Attachment Of Assets......................
Attachment Of Assets......................Attachment Of Assets......................
Attachment Of Assets......................AmanBajaj36
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 

Recently uploaded (20)

🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
Attachment Of Assets......................
Attachment Of Assets......................Attachment Of Assets......................
Attachment Of Assets......................
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 

NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE

  • 1. Sundarapandian et al. (Eds): CoNeCo,WiMo, NLP, CRYPSIS, ICAIT, ICDIP, ITCSE, CS & IT 07, pp. 373–379, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2436 NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE Kasthuri S1 and Meyyappan T2 1 Lecturer, Swami Dayananda College of Arts and Science, Manjakkudi Kasthu.s@gmail.com 2 Professor, Alagappa University, Karaikudi. Meyslotus@yahoo.com ABSTRACT Data mining is the process of extracting hidden patterns of data. Association rule mining is an important data mining task that finds interesting association among a large set of data item. It may disclose pattern and various kinds of sensitive information. Such information may be protected against unauthorized access. Association rule hiding is one of the techniques of privacy preserving data mining to protect the association rules generated by association rule mining. This paper adopts data distortion technique for hiding sensitive association rules. Algorithms based on this technique either hide a specific rule using data alteration technique or hide the rules depending on the sensitivity of the items to be hidden. In the proposed technique, positions of sensitive items are altered while maintaining the support. The proposed technique uses the idea of representative rules to prune the rules first and then hides the sensitive rules. KEYWORDS Association Rule Hiding, Data Mining, Privacy Preserving Data Mining, Distortion, Representative Rule. 1. INTRODUCTION Data mining is a knowledge discovery process of analyzing data from different point of views and to work out into useful patterns. These patterns represent knowledge and are expressed in decision trees, clusters or association rules. The problem of data mining is that from non-sensitive data one is able to infer sensitive information including personal information facts or even patterns that are not supposed to be disclosed. For example the market basket database which is used to analyze customers purchasing behavior represented in the form of association rules. The disclosure of this business information or any knowledge extracted from the data may potentially reveal sensitive trade secrets, whose knowledge can provide a significant advantage to business competitors and thus can cause the data owner to lose business over his or her peers [10]. Privacy preserving data mining is a major research area for protecting sensitive data or knowledge. Association rule hiding is one of the privacy preserving techniques to hide sensitive association rules. All association rule hiding algorithm aims to minimally modify the original database such that no sensitive association rule is derived from it. Next section describes the association rule mining. Section 3 explains classes of association rule hiding algorithms. Section 4 presents the statement of the problem. Section 5 contains the related work on heuristic approaches based on data distortion technique. Section 6 presents the analysis of existing work. Section 6 presents the proposed algorithm for sensitive rule hiding. Section 8
  • 2. 374 Computer Science & Information Technology ( CS & IT ) shows the examples demonstrating the algorithm. Concluding remarks and future works are described in section 9. 2. ASSOCIATION RULE MINING Let I = {i1,…., in} be a set of items. Let D be a set of transactions or database. Each transaction t Є D is an item set such that t is a proper subset of I. A transaction t supports X, a set of items in I, if X is a proper subset of t. Assume that the items in a transaction or an item set are sorted in lexicographic order. An association rule is an implication of the form X Y, where X and Y are subsets of I and X∩Y= Ø. The support of rule X Y can be computed by the following equation: Support(X Y) = |X Y| / |D|, where |X Y| denotes the number of transactions in the database that contains the itemset XY, and |D| denotes the number of the transactions in the database D. The confidence of rule is calculated by following equation: Confidence(X Y) = |X Y|/|X|, where |X| is number of transactions in database D that contains itemset X. A rule X Y is strong if support(X Y) ≥ min_support and confidence(X Y) ≥ min_confidence, where min_support and min_confidence are two given minimum thresholds. Association rule mining algorithms scan the database of transactions and calculate the support and confidence of the rules and retrieve only those rules having support and confidence higher than the user specified minimum support and confidence threshold. Association rule hiding algorithms prevents the sensitive rules from being disclosed. The problem can be stated as follows: “Given a transactional database D, minimum confidence, minimum support and a set R of rules mined from database D. A subset RH of R is denoted as set of sensitive association rules which are to be hidden. The objective is to transform D into a database D‟ in such a way that no association rule in RH will be mined and all non sensitive rules in R could still be mined from D‟. 3. CLASSES OF ASSOCIATION RULE HIDING ALGORITHMS Association rule hiding algorithms can be divided into three distinct classes, namely heuristic approaches, border-based approaches and exact approaches. The first class of approaches involves efficient, fast algorithms that selectively sanitize a set of transactions from the database to hide the sensitive knowledge. Due to their efficiency and scalability, the heuristic approaches have been the focus of attention for the vast majority of researchers in the knowledge hiding field. However, there are several circumstances in which they suffer from undesirable side-effects that lead them to suboptimal solutions. The second set of approaches considers the task of sensitive rule hiding through modification of the original borders in the lattice of the frequent and the infrequent patterns in the dataset. In these schemes, the sensitive knowledge is hidden by enforcing the revised borders (which accommodate the hiding of the sensitive itemsets) in the sanitized database. The algorithms in this class differ both in the borders that they track and use for the hiding strategy, and in the methodology that they follow to enforce the revised borders in the sanitized dataset. Finally, the third class of approaches contains non-heuristic algorithms which conceive the hiding process as a constraint satisfaction problem that they solve by using integer or linear programming. 4. PROBLEM STATEMENT The expression data mining indicates a wide range of tools and techniques to extract useful information which can be sensitive from a large collection of data. Data should be manipulated or distorted in such a way that information cannot be discovered through data mining techniques. While dealing with sensitive information it becomes very important to protect data against unauthorized access. The key problem faced is the need to balance the confidentiality of the disclosed with the legitimate needs of the data user. The proposed approach is based on modifying the database transaction.
  • 3. Computer Science & Information Technology ( CS & IT ) 375 5. PREVIOUS WORK In Distortion Based Technique (Proposed By Veryki- os Et Al, Etc.) work [1] authors propose strategies and a suite of algorithms for hiding sensitive knowledge from data by minimally perturbing their values. In order to achieve this, transactions are modified by removing some items, or inserting some new items depending on the hiding strategy In Distortion based Technique on the basis of sensitive item (proposed by shyue-liang wang et al.) proposed in this work tries to hide certain specific items that are sensitive and proposes two algorithms to modify data in the Dataset. Concept of this paper says that if the sensitive item is on the LHS of the rule then increase its support and if the sensitive item is on the right of the rule then decrease its support. 6. ANALYSIS OF EXISTING TECHNIQUES Approach in [1] tries to hide every single rule without checking if rules can be pruned after some transactions have been changed. Approach in [2] definitely hides all the rules which has sensitive items either in the left or in the right and for this it runs two different algorithms one if sensitive item is on the LHS and another is the sensitive item is on the RHS i.e. it fails to hide all the rules containing sensitive item and takes more number of passes to prune all the rules containing sensitive items. 7. PROPOSED APPROACH The proposed approach selects all the association rules containing sensitive items either in the left or in the right from the set of all association rules generated from a dataset. Then these rules are represented in representative rules (RR) format with sensitive item on the LHS/RHS of the rules. Select a rule from the set of RR’s, which has sensitive item on the LHS/RHS of the rule. Select a transaction that completely support RR i.e. it contains all the items in the RR. Based on this a new approach for modifying database without changing the support of the sensitive item and still maintaining the secrecy of sensitive data has been proposed. 7.1 Representative Association Rule Generally, number of association rules discovered in a given database is very large. It is observed that a considerable percentage of these rules are redundant and useless. A user should be presented with all of them, which are original, novel, and interesting. To address this issue, [6] introduced a notion for concise (loss less) representation of association rules, called representative rules (RR). RR is a least set of rules that allow deducing all association rules without accessing a database. In a notion of cover operator was introduced for driving a set of association rules from a given association rule. The cover of the rule X=>Y, Y ≠φ, is defined as follows: C(X => Y) = {X ∪Y=>V Ζ , V ⊆Y and Z ∩ V = φ and V ≠φ} Each rule in C (X⇒Y ) consists of a subset of items occurring in the rule X ⇒ Y. The number of different rules in the cover of the association X ⇒ Y is equal to 3m – 2m , m = |Y|. In general, the process of generating representative rules may be decomposed in to two sub processes: frequent item-sets generations and generation of RR from frequent item-sets. Let be a frequent itemset and φ ≠ X⊂Y . The association rule X⇒Ζ /X is representative rule if there is no
  • 4. 376 Computer Science & Information Technology ( CS & IT ) association rule ( X⇒Ζ ′/ X)′ where Z⊂ Ζ′, and there is no association rule (X ′⇒Ζ / X′) such that X⊃X ′. Formally, a set of representative rules (RR) for a given association rules (AR) can be defined as follows: RR= { r∈ΑR ¬∃ r’∈AR, r ’≠ r and r∈ C(r’)} Each rule in RR is called representative association rule and no representative rule may belong in the cover of another association rule [8], [9]. The proposed algorithm gives a modified dataset after distorting the database. Input to this algorithm is a Database, value of min_support, min_confidence, and a set of sensitive items. This algorithm computes the large item sets of all the sizes from the given dataset. Then it selects all the rules, which contain sensitive item from the association rules generated. The rules containing sensitive items are represented in the representative rules format and then the sensitive item is deleted from a transaction, which fully supports the selected RR and added to a transaction, which partially supports RR. The detailed steps is given below Algorithm: Hiding Of Sensitive Association Rules Using Support and Confidence Input: (1) D: A source database (2) min_supp : A min_support. (3) min_conf : A min_confidence. (4) H: A set of sensitive items. Output: A transformed database D’ where rules containing H on RHS/LHS will be hidden 1. Find all large item sets from D; 2. For each sensitive item h∈ H { 3. If h is not a large item set then H=H- {h}; 4. If H is empty then EXIT; 5. Select all the rules with min_supp containing h and store in U//h can either be on LHS or RHS 6. Repeat { 7. Select all the rules from U with same LHS 8. Join RHS of selected rules and store in R; //make representative rules 9. }Until (U is empty); 10.Sort R in descending order by the number of supported items; 11. Select a rule r from R 12.Compute confidence of rule r. 13.If conf>min_conf then {//change the position of sensitive item h. 14.Find T1={t in D|t completely supports r ; 15. If t contains x and h then 16.Delete h from t 17.Find T1={t in D|t does not support LHS(r) and Partially supports x; 18.Add h to t 19. Repeat 20. { 21. Choose the first rule from U; 22. Compute confidence of r; 23. } Until(U is empty); 24. }//end of if conf>min_conf
  • 5. Computer Science & Information Technology ( CS & IT ) 377 25. Else 26. Go to step 11; 27. Update D with new transaction t; 28. Remove h from H; 29. Go to step 2; 30.}//end of for each h∈ H Steps of the algorithm are given below: 1. Selects all the rules containing sensitive item(s) either in the left or in the right. 2. Convert these rules in representative rules (RR) format. 3. Selects a rule from the set of RR’s, which has sensitive item on the left of the RR is selected. 4. Deletes the sensitive item(s) from the transaction that completely supports the RR i.e. it contained all the items in of RR selected and add the same sensitive item to a transaction which partially supports RR i.e. where items in RR are absent or only one of them is present. 5. Recomputed the confidence of the rules in U. 8. IMPLEMENTATION OF THE PROPOSED ALGORITHM The proposed algorithm can be illustrated with the following example for a given set of transactional data in Table -1 Table -1: Transactional Dataset1 TID ITEMS T1 ABC T2 ABCD T3 BCE T4 ACDE T5 DE T6 AB For the Dataset given in Table - 1 at a min_supp of 33% and a min_conf of 70 % and sensitive item H={C} we choose all the rules containing ‘C’ either in RHS or LHS and represent them in representative rule format. Out of the 8 association rules the rules containing sensitive items are 6 as shown in Table 2 Table - 2: Sensitive association rules (w.r.t sensitive item C) AR SUPP CONF A => C 50 75 C => A 50 75 A, D => C 33.333 100 C, D => A 33.333 100 B => C 50 75 C => B 50 75 From this rules set select the rules that can be represented in the form of representative rules Like C=> A and C=>B can be represented as C=> AB Now delete C from a transaction where ABC all the three are present and add C to a transaction where A and B both are absent or only one of them is present. For this we change transaction T2 to ABD and transaction T5 to CDE. This
  • 6. 378 Computer Science & Information Technology ( CS & IT ) results in changing the position of the sensitive item without changing its support. This is shown in Table 3. Table-3: Modified Dataset1 for the proposed Approach (Sensitive Item – C) TID ITEMS T1 ABC T2 ABD T3 BCE T4 ACDE T5 CDE T6 AB The new set of association rules generated from this modified dataset is shown in Table-4. Table-4: Association rules remaining unhidden after modifying the Dataset1 AR SUPP CONF B=> A 50 75 A=> B 50 75 i.e. all the rules of the original association rules set containing sensitive items on the LHS or on the RHS are hidden. 9. CONCLUSIONS In this paper, we presented the database privacy problems caused by data mining technology. Association rule mining is an important data mining task that finds interesting association among a large set of data item. It may disclose pattern and various kinds of sensitive information. Such information may be protected against unauthorized access. The main aim of this work is to propose a new method to hide the sensitive association rules. Data will be distorted in such a way that sensitive information cannot be discovered through data mining techniques. The proposed work analyses the existing techniques and gives their limitations. The proposed method uses the idea of representative rules. The confidence of the sensitive rules will be reduced but the support remains the same. It doesn’t modify the database transactions. This method will hide all the rules containing the sensitive items. Example demonstrating the proposed algorithm is shown. In the proposed method, the confidence of the rule is computed and it is represented as representative rules. After hiding the sensitive rules the confidence of RR is again computed even if it falls below the min_conf threshold. So it has to be avoided in the future.
  • 7. Computer Science & Information Technology ( CS & IT ) 379 REFERENCES [1] Vassilios S. Verykios,, Ahmed K. Elmagarmid , Elina Bertino, Yucel Saygin, Elena Dasseni. “Association Rule Hiding”, IEEE Transactions on knowledge and data engineering, Vol.6, NO.4, April 2004 [2] Shyue-Liang Wang, Yu-Huei Lee, Billis S., Jafari, A. “Hiding sensitive items in privacy preserving association rule mining”, IEEE International Conference on Systems, Man and Cybernetics, Volume 4, 10-13 Oct. 2004 Page(s): 3239 - 3244 . [3] E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino. “Hiding Association Rules by Using Confidence and Support”, in Proceedings of 4th Information Hiding Workshop, 369-383, Pittsburgh, PA, 2001. [4] JIAWEI HAN and MICHALINE KAMBER, “Data Mining Conceptsd And Techniques”, Morgon Kaufman Publishers 2002 [5] Wang. S.L., Jafari, A. “Using unknowns for hiding sensitive predictive association rules”, Information Reuse and Integration, Conf, 2005. IRI -2005 IEEE International Conference on. 15-17 Aug. 2005 Page(s): 223 - 228. [6] Marzena Kryszkiewicz. “Representative Association Rules”, In proceedings of PAKDD’98, Melbourne,Australia(Lecture notes in artificialIntelligence,LANI 1394, Springer-Verleg,1998,pp 198- 209. [7] Yucel Saygin, Vassilios S. Verykios, Chris Clifton. “Using unknowns to prevent discovery of association rules”, ACM SIGMOD Record Volume 30 Issue 4, pp. 45 - 54 , (2001) [8] Yiqun Huang, Zhengding Lu, Heping Hu, “A method of security improvement for privacy preserving association rule mining over vertically partitioned data”, 9th International Database Engineering and Application Symposium, pp. 339 – 343, (2005) [9] Saygin Y., Verykios V.S. and Elmagarmid A.K., “Privacy preserving association rule mining,” IEEE Proceedings of the 12th Int’l Workshop on Research Issues in Data Engineering, pp. 151 – 158, (2002) [10] Aris Gkoulalas–Divanis;Vassilios S. Verykios “Association Rule Hiding For Data Mining” Springer, DOI 10.1007/978-1-4419-6569-1, Springer Science + Business Media, LLC 2010