SlideShare a Scribd company logo
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 22
An Optimal Approach For Knowledge Protection In Structured
Frequent Patterns
Cynthia Selvi P pselvi1501@gmail.com
Associate Professor, Dept. of Computer Science
Kunthavai Naacchiyar Govt. Arts College for Women(Autonomous), Thanjavur 613007
Affiliated to Bharathidasan University, Tiruchirapalli, TamilNadu, India.
Mohamed Shanavas A.R vas0699@yahoo.co.in
Associate Professor, Dept. of Computer Science,
Jamal Mohamed College, Tiruchirapalli 620 020
Affiliated to Bharathidasan University, Tiruchirapalli, TamilNadu, India.
Abstract
Data mining is valuable technology to facilitate the extraction of useful patterns and trends from
large volume of data. When these patterns are to be shared in a collaborative environment, they
must be protectively shared among the parties concerned in order to preserve the confidentiality
of the sensitive data. Sharing of information may be in the form of datasets or in any of the
structured patterns like trees, graphs, lattices, etc., This paper propose a sanitization algorithm for
protecting sensitive data in a structured frequent pattern(tree).
Keywords: Rank Function, Restricted Node, Sanitization, Structured Pattern, Victim States.
1. INTRODUCTION
Data mining is an emerging technology to provide various means for identifying the interesting
and important knowledge from large data collections. When this knowledge is to be shared
among various parties in decision making activities, the sensitive data is to be preserved by the
parties concerned. In particular, when multiple companies want to share the customer’s buying
behavior in a collaborative business environment that promote business, the sensitive information
of the individual company should be protected against sharing. The information to be shared may
be in the form of datasets, frequent itemsets, structured patterns or subsequences. Here
structured pattern refers to substructures like graphs, trees or lattices that contain frequent
itemsets[1]. Various approaches have been proposed so far to address this problem of preserving
sensitive patterns. This paper propose an algorithm that is aimed to sanitize sensitive information
in a frequent pattern tree(because trees exhibits the relationships among the itemsets more
clearly) which leaves no trace for the counterpart or an adversary to extract the hidden
information back, by blocking all possible inferences.
In this article, section-II briefs the literature review; section-III states the definitions needed for the
sanitization approach and algorithm presented in this article and section-IV gives the proposed
algorithm. In section-V illustration with sample graphs are given and in section-VI the
performance metrics are discussed with sample results.
2. LITERATURE REVIEW
Due to wide applicability of the field data mining and in particular for the task of association rules,
the focus has been more specific for the problem of protection of sensitive knowledge against
inference and it has been addressed by various researchers[2-12]. This task is referred to as
sanitization in [2] which blocks inference of sensitive rules that facilitate collaborators to mine
independently their own data and then sharing some of the resulting patterns. The above work
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 23
concentrate on hiding frequent itemsets in databases based on the support and/or confidence
framework. In many situations, it would be more comfortable to share the information in the form
of structured patterns like graphs, trees, lattices, etc instead of sharing the entire databases.
In structured patterns when a particular sensitive pattern is to be removed, its supersets and
subsets should also be removed in order to block the forward and backward references. The work
presented in [7], proposes an algorithm(DSA) that sanitize sensitive information in Graphs and
have compared the efficiency with that of Naïve approach. Naïve blocks only the forward
inference attack; but DSA blocks both forward and backward inference attacks. But in DSA, the
subsets of the sensitive pattern are chosen at random. In this situation, possibility is there for the
removal of more number of patterns; because, when a subset pattern is removed, the other
patterns associated with it would also be removed failing which would leave forward trace for the
counterpart to infer the details of the hidden pattern. Hence, this random removal would reduce
the data utility of the source dataset. To overcome this problem, the work proposed in this article
presents an algorithm(RSS) for sanitizing sensitive information in structured pattern tree that use
a rank function for reducing the computational complexity and legitimate information loss. In
comparison with DSA, this algorithm completely blocks the forward and backward inference
attacks by removing the sensitive information and its associated information in an optimized way
by means of the rank function.
3. BASIC DEFINITIONS
Tree: A Tree is a finite set of one or more nodes such that there is a specially designated node
called the root and the remaining nodes are partitioned into n ≥ 0 disjoint sets T1, …Tn, where
each of these nodes is a tree. The sets T1,..Tn are called the subtrees of the root[13].
Set-Enumeration (SE)-tree: It is a tool for representing and/or enumerating sets in a best-first
fashion. The complete SE-tree systematically enumerates elements of a power-set using a pre-
imposed order on the underlying set of elements.
Structured Pattern Tree: A structured pattern tree denoted by T=(N, L) consists of nonempty set
of frequent itemsets N, a set of links L that are ordered pairs of the elements of N such that for all
nodes a, b Є N there is a link from a to b if a ∩ b = a and |b| - |a| = 1, where |x| is the size of the
itemset x.
Level: Let T=(N, L) be a structured pattern(frequent itemset) tree. The level k of an itemset x such
that x Є N, is the length of the path connecting an 1-itemset (usually al level-0) to x.
Height: Let T=(N, L) be a structured pattern tree. The height, h of T is the length of the maximum
path connecting an 1-itemset a with any other itemset b, such that a,b Є N and a⊂ b.
Delete: The deletion of a node x from Ti, is denoted as Del(x). The resulting Ti
’
is the same as Ti
without the node x. In particular, if p1,..,pm , x, s1, ..., sn is the sibling sequence in a level of Ti, then
p1, ...,pm , s1, ..., sn is the sibling sequence in Ti
’
.
Negative Border Nodes: Negative border nodes possess the property of having all its members
(proper subsets) are frequent.
Problem state: Each node in the tree is a problem state.
R-nodes: Nodes that are sensitive and to be restricted before allowing the structured pattern to be
shared.
P-nodes: Predecessor node(subsets) of R-nodes which are to be identified (in order to block
forward inference) before selecting the particular nodes that are to be deleted.
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 24
S-nodes: Successor nodes(supersets) of R-nodes which are to be identified (in order to block
backward inference) before selecting the particular nodes that are to be deleted.
Victim states: Problem states for which the path from P-node(s) at level-1(containing 2-itemsets)
to R-node and/or to S-node(s) are to be searched to select nodes for deletion.
V-node(s): Node(s) to be deleted selectively (based on rank function) among the victim states.
Rank function - r(.): Choose P-node (of R-node) which leads to only one S-node (with single
Primary Link); choose one at random when tie occurs. The search for victim nodes can often be
speeded up by using the ranking function r(.) for all P-nodes. The ideal way to assign ranks would
be on the basis of minimum additional computational cost needed when this P-node is to be
removed.
4. ALGORITHM
Rank-based Structured-pattern Sanitization(RSS):
Input: Frequent Pattern Tree(T), Set of Restricted Nodes(R-nodes)
Output: Sanitized Tree(T’)
Begin
Obtain height h of the input tree;
identify ri Є R ( R-nodes to be restricted);
//Select victim nodes//
for each ri Є R
{
find level k;
V_nodes[ ] ← ri ;
if k > 0
{
do while(k<=h)
{
obtain S-nodes of ri (ie supersets);
V_nodes[ ] ← V_nodes[ ]+S-nodes(ri);
}
do while(k>=1)
{
obtain P-nodes of ri (ie subsets );
V_nodes[ ] ← V_nodes[ ]+P-node that satisfy r(.);
}
}
delete V_nodes[ ];
}
T’←T;
End
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 25
5. ILLUSTRATION
A sample frequent pattern SE-tree is given in Fig.1. Let the node to be protected(R-node) is the
one with itemset abc(dark-filled in Fig.2); When this is marked for deletion(V-nodes),
conventionaly it becomes infrequent. As per antimonotone property of frequent itemsets, if a set
cannot pass a test, all of its supersets will fail the same test as well. Hence all of its supersets(S-
nodes) are to be identified and deleted until the level equals the height of the tree. In this
example, node abcd (shaded) is the superset of abc and so it is marked for deletion(V-nodes).
Deletion of R-node and its supersets may completely hide the details of the sensitive
data(Restricted nodes) and this ensures the blocking of backward inference of R-node.
Morever, the negative border nodes are also to be deleted to completely block the future
inference of the sensitive data. This can be achieved by identifying the Predecessor nodes(P-
node) of R-node and suitably removing them by means of rank function-r(.) defined earlier. In this
example, abc has two P-nodes, ab and ac which are having primarly links and of them as
ac(shaded) has only one primary link, it is marked for deletion(V-nodes) with all its successors(in
this case, acd). Refer Fig.2.
Finally delete all victim nodes and thus the sanitized frequent pattern tree to be shared is resulted
(the one given Fig.3) and hence forward inference is also blocked.
On the contrary, if ab would have been chosen as victim node, then three more nodes would
have been additionally removed which would result in more information loss and utility loss.
Hence the rank function used in this approach sanitizes the structured frequent pattern tree with
reduced information loss and utility loss.
However, the nodes at level-0 (1-itemsets) are not deleted in any way and this preserves the
distinct items in the given structured frequent pattern tree.
FIGURE 1: Frequent Pattern Tree before Sanitization.
a b c d e
ab ac ad bc bd cd de
abc abd acd ade bde
be
abcd abde
ɸ
bcd
ae
abe
Primary Link Secondary Link
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 26
a b c d e
ab ad bc bd cd de
abd ade bde
be
abde
ɸ
bcd
ae
abe
FIGURE 3: Frequent Pattern Tree after Sanitization.
a b c d e
ab ac ad bc bd cd de
abc abd acd ade bde
be
abcd abde
ɸ
bcd
ae
abe
FIGURE 2: Frequent Pattern Tree with Victim Nodes.
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 27
6. EXPERIMENTAL ANALYSIS
The algorithm was tested for real dataset T10I4D100K[14] with number of transactions ranging
from 1K to 10K and number of restricted nodes from 1 to 5. The test run was made on Intel core
i5 processor with 2.3 GHz speed and 4GB RAM operating on 32 bit OS; The implementation of
the proposed algorithm was done with windows 7 - Netbeans 6.9.1 - SQL 2005. The frequent
patterns were obtained using Matrix Apriori[15], which requires only two scans of original
database and uses simpler data structures.
The efficiency of this approach is studied based on the measures given below and it has been
compared (Figures 4 to 7) with the previously proposed algorithms IMA, PMA, TMA[9-12] which
sanitizes the sensitive patterns(itemsets) in the source datasets.
Dissimilarity(dif) : The dissimilarity between the original(D) and sanitized(D’) databases is
measured in terms of their contents which can be measured by the formula,
dif(D, D’) = x
where fx(i) represents the i
th
item in the dataset X. This approach has very low percentage of
dissimilarity and this shows that information loss is very low and so the utility is well preserved.
From the fig.4 &5, it is observed that the proposed algorithm, RSS has very low dissimilarity in
comparison with previous algorithms. However, when the no. of transactions are increased, the
dissimilarity gets increased; this is due to the removal of subsets(with its associated nodes) of the
sensitive nodes for blocking backward inference attack and it is observed to be less than 5%.
CPU Time: The execution time is tested for the proposed algorithm by varying the number of
nodes to be restricted. Fig.6 & 7 shows that the execution time required for RSS algorithm is low
in comparison with the other algorithms. It is also observed that execution time is minimum, when
the no. of transactions in the source dataset is more. However, time is not a significant criteria as
the sanitization is done offline.
FIGURE 4: Dissimilarity
(varying no.of rules).
FIGURE 5: Dissimilarity
(varying no.of transactions).
FIGURE 6: Execution Time
(varying no.of rules).
FIGURE 7: Execution Time
(varying no.of transactions).
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 28
Scalability: In order to effectively hide sensitive knowledge in patterns, the sanitization
algorithms must be efficient and scalable which means the running time of any sanitizing
algorithm must be predictable and acceptable. The efficiency and scalability of the proposed
approach is proved below:
Theorem: The running time of the Rank-based Structured-pattern Sanitization(RSS) approach is
at least O[r(l+s)]; where r is the number of restrictive nodes(R-nodes), l is the number of
preceding levels that have subsets of R-nodes and s is the number of S-nodes(supersets) of
R-nodes.
Proof : Let T be a given Structured frequent pattern tree with N being the total number of nodes in
T; r be the number of sensitive nodes(R-nodes) to be restricted among N; l be the number of
preceding levels of R-nodes and s be the number of S-nodes(supersets) of R-nodes in T.
The proposed approach finds the height of the given tree. For every given R-node, find the victim
states which are the collection of its S-nodes(supersets) and P-nodes(subsets) that lead with only
one primary link for their own successors. As this approach satisfies anti-monotone property, all s
S-nodes are victim nodes and to be deleted to block the backward inferences. However
among the P-nodes(subsets), at each preceding level (other than level-0) the node(subset)
which forms as a single primary link for its successors is to be obtained and deleted (with all its
successors) in order to block all forward inferences; this selection process is quiet straightforward
and it gets repeated for all R-nodes.
This algorithm makes use of both depth-wise and breadth-wise search which requires atleast
O(l+s) computational complexity for every R-node.
Hence, the running time of proposed algorithm for k R-nodes is atleast O[r(l+s)], which is linear
and better than O(n
2
), O(n
3
), O(2
n
), O(n log N).
7. CONCLUSION
The proposed algorithm in this work sanitizes the structured frequent pattern tree in an optimal
way, by using a rank function that reduces the computational complexity as well as the
information loss and utility loss. Moreover, this approach blocks all the inference channels of the
restrictive patterns in both forward and backward directions leaving no trace of the nodes that are
restricted(removed) before sharing. This simulation process facilitates the task of sanitizing the
structured pattern with different set of restricted information when it is to be shared between
different set of collaborators. However, when the database is large, it is sometimes unrealistic to
construct a main-memory based pattern tree. The proposed algorithm sanitizes patterns in static
dataset and also the sanitization is done offline due to the offline decision analysis of the
restricted rules. But further effort is being taken to apply optimized heuristic approach to sanitize
continuous and dynamic dataset.
8. REFERENCES
[1] J.Han, M.Kamber, Data Mining Concepts and Techniches, Oxford University Press, 2009.
[2] M.Atallah, E.Bertino, A.Elmagarmid, M.Ibrahim and V.Verykios “Disclosure Limitation of
Sensitive Rules”, Proc. of IEEE Knowledge and Data Engineering Workshop, pages 45–52,
Chicago, Illinois, Nov 1999.
[3] E.Dasseni, V.S.Verykios, A.K.Elmagarmid & E.Bertino, “Hiding Association Rules by Using
Confidence and Support”, Proc. of the 4th Information Hiding Workshop, pages 369– 383,
Pittsburg, PA, Apr 2001.
[4] Y.Saygin, V.S.Verykios, and C.Clifton, “Using Unknowns to Prevent Discovery of Association
Rules”, SIGMOD Record, 30(4):45–54, Dec 2001.
Cynthia Selvi P & Mohamed Shanavas A.R
International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 29
[5] S.R.M.Oliveira, and O.R.Zaiane, “Privacy preserving Frequent Itemset Mining”, Proc. of the
IEEE ICDM Workshop on Privacy, Security, and Data Mining, Pages 43-54, Maebashi City,
Japan, Dec 2002.
[6] S.R.M.Oliveira, and O.R.Zaiane, “An Efficient One-Scan Sanitization for Improving the
Balance between Privacy and Knowledge Discovery”, Technical Report TR 03-15, Jun 2003.
[7] S.R.M.Oliveira, and O.R.Zaiane, “Secure Association Rule Mining”, Proc. of the 8
th
Pacific-
Asia Conference on Knowledge Discovery and Data Mining(PAKDD’04), Pages 74-85,
Sydney, Australia, May 2004..
[8] B.Yildz, and B.Ergenc, “Hiding Sensitive Predictive Frequent Itemsets”, Proc. of the
International MultiConference of Engineers and Computer Scientists 2011, Vol-I.
[9] P.Cynthia Selvi, A.R.Mohamed Shanavas, “An effective Heuristic Approach for Hiding
Sensitive Patterns in Databases”, International Organization of Scientific Research-Journal
of Computer Engineering(IOSRJCE) Vol. 5, Issue 1(Sep-Oct 2012), PP 06-11.
[10] P.Cynthia Selvi, A.R.Mohamed Shanavas, “An Improved Item-based Maxcover Algorithm to
protect Sensitive Patterns in Large Databases”, International Organization of Scientific
Research-Journal of Computer Engineering(IOSRJCE) Vol.14, Issue 4, Oct 2013, Pages 1-5.
[11] P.Cynthia Selvi, A.R.Mohamed Shanavas, “Output Privacy Protection With Pattern-Based
Heuristic Algorithm”, International Journal of Computer Science & Information
Technology(IJCSIT) Vol 6, No 2, Apr 2014, Pages 141 – 152.
[12] P.Cynthia Selvi, A.R.Mohamed Shanavas, “Towards Information Privacy Using Transaction-
Based Maxcover Algorithm”, World Applied Sciences Journal 29 (Data Mining and Soft
Computing Techniques): 06-11, 2014.
[13] Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, Fundamentals of Computer
Algorithms, Galgotia Pub. Pvt. Ltd, Delhi, 1999.
[14] The Dataset used in this work for experimental analysis was generated using the generator
from IBM Almaden Quest research group and is publicly available from
http://fimi.ua.ac.be/data/.
[15] J.Pavon, S.Viana, S.Gomez, “Matrix Apriori: speeding up the search for frequent patterns”,
Proc. 24th IASTED International Conference on Databases and Applications 2006, pp. 75-82.

More Related Content

What's hot

M08 BiasVarianceTradeoff
M08 BiasVarianceTradeoffM08 BiasVarianceTradeoff
M08 BiasVarianceTradeoff
Raman Kannan
 
Decision Tree - C4.5&CART
Decision Tree - C4.5&CARTDecision Tree - C4.5&CART
Decision Tree - C4.5&CARTXueping Peng
 
Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs
ShahDhruv21
 
Decision tree lecture 3
Decision tree lecture 3Decision tree lecture 3
Decision tree lecture 3Laila Fatehy
 
Data Mining: Mining stream time series and sequence data
Data Mining: Mining stream time series and sequence dataData Mining: Mining stream time series and sequence data
Data Mining: Mining stream time series and sequence data
DataminingTools Inc
 
Data Mining
Data MiningData Mining
Data Mining
Jay Nagar
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
guest0edcaf
 
Chapter 4 Classification
Chapter 4 ClassificationChapter 4 Classification
Chapter 4 Classification
Khalid Elshafie
 
Data discretization
Data discretizationData discretization
Data discretization
Hadi M.Abachi
 
2018 p 2019-ee-a2
2018 p 2019-ee-a22018 p 2019-ee-a2
2018 p 2019-ee-a2
uetian12
 
1.8 discretization
1.8 discretization1.8 discretization
1.8 discretization
Krish_ver2
 
Data mining technique (decision tree)
Data mining technique (decision tree)Data mining technique (decision tree)
Data mining technique (decision tree)
Shweta Ghate
 
Machine Learning Unit 3 Semester 3 MSc IT Part 2 Mumbai University
Machine Learning Unit 3 Semester 3  MSc IT Part 2 Mumbai UniversityMachine Learning Unit 3 Semester 3  MSc IT Part 2 Mumbai University
Machine Learning Unit 3 Semester 3 MSc IT Part 2 Mumbai University
Madhav Mishra
 
Chapter 05 k nn
Chapter 05 k nnChapter 05 k nn
Chapter 05 k nn
Raman Kannan
 
Polikar10missing
Polikar10missingPolikar10missing
Polikar10missing
kagupta
 
Associative Classification: Synopsis
Associative Classification: SynopsisAssociative Classification: Synopsis
Associative Classification: SynopsisJagdeep Singh Malhi
 
Classifiers
ClassifiersClassifiers
Classifiers
Ayurdata
 
Sparse inverse covariance estimation using skggm
Sparse inverse covariance estimation using skggmSparse inverse covariance estimation using skggm
Sparse inverse covariance estimation using skggm
Manjari Narayan
 
Health-e-Child CaseReasoner
Health-e-Child CaseReasonerHealth-e-Child CaseReasoner
Health-e-Child CaseReasoner
GaborRendes
 
Hypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining AlgorithmsHypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining Algorithms
IJERA Editor
 

What's hot (20)

M08 BiasVarianceTradeoff
M08 BiasVarianceTradeoffM08 BiasVarianceTradeoff
M08 BiasVarianceTradeoff
 
Decision Tree - C4.5&CART
Decision Tree - C4.5&CARTDecision Tree - C4.5&CART
Decision Tree - C4.5&CART
 
Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs
 
Decision tree lecture 3
Decision tree lecture 3Decision tree lecture 3
Decision tree lecture 3
 
Data Mining: Mining stream time series and sequence data
Data Mining: Mining stream time series and sequence dataData Mining: Mining stream time series and sequence data
Data Mining: Mining stream time series and sequence data
 
Data Mining
Data MiningData Mining
Data Mining
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
 
Chapter 4 Classification
Chapter 4 ClassificationChapter 4 Classification
Chapter 4 Classification
 
Data discretization
Data discretizationData discretization
Data discretization
 
2018 p 2019-ee-a2
2018 p 2019-ee-a22018 p 2019-ee-a2
2018 p 2019-ee-a2
 
1.8 discretization
1.8 discretization1.8 discretization
1.8 discretization
 
Data mining technique (decision tree)
Data mining technique (decision tree)Data mining technique (decision tree)
Data mining technique (decision tree)
 
Machine Learning Unit 3 Semester 3 MSc IT Part 2 Mumbai University
Machine Learning Unit 3 Semester 3  MSc IT Part 2 Mumbai UniversityMachine Learning Unit 3 Semester 3  MSc IT Part 2 Mumbai University
Machine Learning Unit 3 Semester 3 MSc IT Part 2 Mumbai University
 
Chapter 05 k nn
Chapter 05 k nnChapter 05 k nn
Chapter 05 k nn
 
Polikar10missing
Polikar10missingPolikar10missing
Polikar10missing
 
Associative Classification: Synopsis
Associative Classification: SynopsisAssociative Classification: Synopsis
Associative Classification: Synopsis
 
Classifiers
ClassifiersClassifiers
Classifiers
 
Sparse inverse covariance estimation using skggm
Sparse inverse covariance estimation using skggmSparse inverse covariance estimation using skggm
Sparse inverse covariance estimation using skggm
 
Health-e-Child CaseReasoner
Health-e-Child CaseReasonerHealth-e-Child CaseReasoner
Health-e-Child CaseReasoner
 
Hypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining AlgorithmsHypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining Algorithms
 

Viewers also liked

Tutorial de eclipse
Tutorial de eclipseTutorial de eclipse
Tutorial de eclipse
Eduardo Medina
 
русский писатель в гостях у китая
русский писатель в гостях у китаярусский писатель в гостях у китая
русский писатель в гостях у китая
Игорь Дябкин
 
Test slide
Test slideTest slide
Overview_complete
Overview_completeOverview_complete
Overview_complete
anapaulamoura2
 
Sample econ 3rd
Sample econ 3rdSample econ 3rd
Sample econ 3rd
teutli
 
Урок ЗНО 2016
Урок ЗНО 2016Урок ЗНО 2016
под прицелом зависти
под прицелом завистипод прицелом зависти
под прицелом зависти
Alexander Semenchuk
 
Coccyx Cushion
Coccyx CushionCoccyx Cushion
Coccyx Cushiondebrawtwk
 
христианство. иконопись
христианство. иконописьхристианство. иконопись
христианство. иконопись
Игорь Дябкин
 
New zealand
New zealandNew zealand
New zealand
kochukova
 
Decanter centrifuge
Decanter centrifugeDecanter centrifuge
Decanter centrifuge
Jessie Aipu solids control
 
тhе new zealand
тhе new zealandтhе new zealand
тhе new zealand
kochukova
 
Performance Assessment of Faculties of Management Discipline From Student Per...
Performance Assessment of Faculties of Management Discipline From Student Per...Performance Assessment of Faculties of Management Discipline From Student Per...
Performance Assessment of Faculties of Management Discipline From Student Per...
Waqas Tariq
 
Sponsorship & Marketing Plan - AC Savoia
Sponsorship & Marketing Plan - AC SavoiaSponsorship & Marketing Plan - AC Savoia
Sponsorship & Marketing Plan - AC Savoia
Emilio Reppucci
 
capacidad del proceso de produccion , analisis de los cuellos de botella
capacidad del proceso de produccion , analisis de los cuellos de botellacapacidad del proceso de produccion , analisis de los cuellos de botella
capacidad del proceso de produccion , analisis de los cuellos de botella
memobetancourt20
 
FARPI-FRANCE vous présente ses convoyeurs standards VIRGINIO
FARPI-FRANCE vous présente ses convoyeurs standards VIRGINIOFARPI-FRANCE vous présente ses convoyeurs standards VIRGINIO
FARPI-FRANCE vous présente ses convoyeurs standards VIRGINIO
FARPI-FRANCE
 
Geografi Tingkatan 1: Mukabumi tanah tinggi
Geografi Tingkatan 1: Mukabumi  tanah tinggiGeografi Tingkatan 1: Mukabumi  tanah tinggi
Geografi Tingkatan 1: Mukabumi tanah tinggi
Ramli Rem
 

Viewers also liked (18)

Tutorial de eclipse
Tutorial de eclipseTutorial de eclipse
Tutorial de eclipse
 
русский писатель в гостях у китая
русский писатель в гостях у китаярусский писатель в гостях у китая
русский писатель в гостях у китая
 
Test 7ºAB_May2012
Test 7ºAB_May2012Test 7ºAB_May2012
Test 7ºAB_May2012
 
Test slide
Test slideTest slide
Test slide
 
Overview_complete
Overview_completeOverview_complete
Overview_complete
 
Sample econ 3rd
Sample econ 3rdSample econ 3rd
Sample econ 3rd
 
Урок ЗНО 2016
Урок ЗНО 2016Урок ЗНО 2016
Урок ЗНО 2016
 
под прицелом зависти
под прицелом завистипод прицелом зависти
под прицелом зависти
 
Coccyx Cushion
Coccyx CushionCoccyx Cushion
Coccyx Cushion
 
христианство. иконопись
христианство. иконописьхристианство. иконопись
христианство. иконопись
 
New zealand
New zealandNew zealand
New zealand
 
Decanter centrifuge
Decanter centrifugeDecanter centrifuge
Decanter centrifuge
 
тhе new zealand
тhе new zealandтhе new zealand
тhе new zealand
 
Performance Assessment of Faculties of Management Discipline From Student Per...
Performance Assessment of Faculties of Management Discipline From Student Per...Performance Assessment of Faculties of Management Discipline From Student Per...
Performance Assessment of Faculties of Management Discipline From Student Per...
 
Sponsorship & Marketing Plan - AC Savoia
Sponsorship & Marketing Plan - AC SavoiaSponsorship & Marketing Plan - AC Savoia
Sponsorship & Marketing Plan - AC Savoia
 
capacidad del proceso de produccion , analisis de los cuellos de botella
capacidad del proceso de produccion , analisis de los cuellos de botellacapacidad del proceso de produccion , analisis de los cuellos de botella
capacidad del proceso de produccion , analisis de los cuellos de botella
 
FARPI-FRANCE vous présente ses convoyeurs standards VIRGINIO
FARPI-FRANCE vous présente ses convoyeurs standards VIRGINIOFARPI-FRANCE vous présente ses convoyeurs standards VIRGINIO
FARPI-FRANCE vous présente ses convoyeurs standards VIRGINIO
 
Geografi Tingkatan 1: Mukabumi tanah tinggi
Geografi Tingkatan 1: Mukabumi  tanah tinggiGeografi Tingkatan 1: Mukabumi  tanah tinggi
Geografi Tingkatan 1: Mukabumi tanah tinggi
 

Similar to An Optimal Approach For Knowledge Protection In Structured Frequent Patterns

Data Structures unit I Introduction - data types
Data Structures unit I Introduction - data typesData Structures unit I Introduction - data types
Data Structures unit I Introduction - data types
AmirthaVarshini80
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
Editor IJCATR
 
Asymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAsymptotic Notation and Data Structures
Asymptotic Notation and Data Structures
Amrinder Arora
 
CIS-(Data Structures and Algorithms)FALL2023.pdf
CIS-(Data Structures and Algorithms)FALL2023.pdfCIS-(Data Structures and Algorithms)FALL2023.pdf
CIS-(Data Structures and Algorithms)FALL2023.pdf
ShayanAamir2
 
International Journal of Computer Science and Security Volume (2) Issue (5)
International Journal of Computer Science and Security Volume (2) Issue (5)International Journal of Computer Science and Security Volume (2) Issue (5)
International Journal of Computer Science and Security Volume (2) Issue (5)CSCJournals
 
Discovering Novel Information with sentence Level clustering From Multi-docu...
Discovering Novel Information with sentence Level clustering  From Multi-docu...Discovering Novel Information with sentence Level clustering  From Multi-docu...
Discovering Novel Information with sentence Level clustering From Multi-docu...
irjes
 
IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363SHIVA REDDY
 
M tree
M treeM tree
M tree
Sriram Raj
 
Data-Structure-original-QuantumSupply.pdf
Data-Structure-original-QuantumSupply.pdfData-Structure-original-QuantumSupply.pdf
Data-Structure-original-QuantumSupply.pdf
lehal93146
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sine
ijcsa
 
Reduct generation for the incremental data using rough set theory
Reduct generation for the incremental data using rough set theoryReduct generation for the incremental data using rough set theory
Reduct generation for the incremental data using rough set theory
csandit
 
Higher Order Learning
Higher Order LearningHigher Order Learning
Higher Order Learningbutest
 
02 linked list_20160217_jintaekseo
02 linked list_20160217_jintaekseo02 linked list_20160217_jintaekseo
02 linked list_20160217_jintaekseo
JinTaek Seo
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
DheerajPachauri
 
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Devansh16
 
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...
cscpconf
 
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
csandit
 
104333 sri vidhya eng notes
104333 sri vidhya eng notes104333 sri vidhya eng notes
104333 sri vidhya eng notes
Krishnakumar Btech
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Preparation Data Structures 03 abstract data_types
Preparation Data Structures 03 abstract data_typesPreparation Data Structures 03 abstract data_types
Preparation Data Structures 03 abstract data_types
Andres Mendez-Vazquez
 

Similar to An Optimal Approach For Knowledge Protection In Structured Frequent Patterns (20)

Data Structures unit I Introduction - data types
Data Structures unit I Introduction - data typesData Structures unit I Introduction - data types
Data Structures unit I Introduction - data types
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
Asymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAsymptotic Notation and Data Structures
Asymptotic Notation and Data Structures
 
CIS-(Data Structures and Algorithms)FALL2023.pdf
CIS-(Data Structures and Algorithms)FALL2023.pdfCIS-(Data Structures and Algorithms)FALL2023.pdf
CIS-(Data Structures and Algorithms)FALL2023.pdf
 
International Journal of Computer Science and Security Volume (2) Issue (5)
International Journal of Computer Science and Security Volume (2) Issue (5)International Journal of Computer Science and Security Volume (2) Issue (5)
International Journal of Computer Science and Security Volume (2) Issue (5)
 
Discovering Novel Information with sentence Level clustering From Multi-docu...
Discovering Novel Information with sentence Level clustering  From Multi-docu...Discovering Novel Information with sentence Level clustering  From Multi-docu...
Discovering Novel Information with sentence Level clustering From Multi-docu...
 
IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363
 
M tree
M treeM tree
M tree
 
Data-Structure-original-QuantumSupply.pdf
Data-Structure-original-QuantumSupply.pdfData-Structure-original-QuantumSupply.pdf
Data-Structure-original-QuantumSupply.pdf
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sine
 
Reduct generation for the incremental data using rough set theory
Reduct generation for the incremental data using rough set theoryReduct generation for the incremental data using rough set theory
Reduct generation for the incremental data using rough set theory
 
Higher Order Learning
Higher Order LearningHigher Order Learning
Higher Order Learning
 
02 linked list_20160217_jintaekseo
02 linked list_20160217_jintaekseo02 linked list_20160217_jintaekseo
02 linked list_20160217_jintaekseo
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
 
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...
 
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE D...
 
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
 
104333 sri vidhya eng notes
104333 sri vidhya eng notes104333 sri vidhya eng notes
104333 sri vidhya eng notes
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Preparation Data Structures 03 abstract data_types
Preparation Data Structures 03 abstract data_typesPreparation Data Structures 03 abstract data_types
Preparation Data Structures 03 abstract data_types
 

More from Waqas Tariq

The Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetThe Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a Widget
Waqas Tariq
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image
Waqas Tariq
 
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Waqas Tariq
 
A Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledA Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab Disabled
Waqas Tariq
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor Filter
Waqas Tariq
 
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Waqas Tariq
 
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Waqas Tariq
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational Knolwedge
Waqas Tariq
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI design
Waqas Tariq
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Waqas Tariq
 
An overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceAn overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer Interface
Waqas Tariq
 
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Waqas Tariq
 
Principles of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesPrinciples of Good Screen Design in Websites
Principles of Good Screen Design in Websites
Waqas Tariq
 
Progress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaProgress of Virtual Teams in Albania
Progress of Virtual Teams in Albania
Waqas Tariq
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Waqas Tariq
 
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
Waqas Tariq
 
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Waqas Tariq
 
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorDynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Waqas Tariq
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity Removal
Waqas Tariq
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Waqas Tariq
 

More from Waqas Tariq (20)

The Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetThe Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a Widget
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image
 
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
 
A Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledA Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab Disabled
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor Filter
 
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
 
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational Knolwedge
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI design
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
 
An overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceAn overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer Interface
 
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
 
Principles of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesPrinciples of Good Screen Design in Websites
Principles of Good Screen Design in Websites
 
Progress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaProgress of Virtual Teams in Albania
Progress of Virtual Teams in Albania
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
 
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
 
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
 
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorDynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity Removal
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

An Optimal Approach For Knowledge Protection In Structured Frequent Patterns

  • 1. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 22 An Optimal Approach For Knowledge Protection In Structured Frequent Patterns Cynthia Selvi P pselvi1501@gmail.com Associate Professor, Dept. of Computer Science Kunthavai Naacchiyar Govt. Arts College for Women(Autonomous), Thanjavur 613007 Affiliated to Bharathidasan University, Tiruchirapalli, TamilNadu, India. Mohamed Shanavas A.R vas0699@yahoo.co.in Associate Professor, Dept. of Computer Science, Jamal Mohamed College, Tiruchirapalli 620 020 Affiliated to Bharathidasan University, Tiruchirapalli, TamilNadu, India. Abstract Data mining is valuable technology to facilitate the extraction of useful patterns and trends from large volume of data. When these patterns are to be shared in a collaborative environment, they must be protectively shared among the parties concerned in order to preserve the confidentiality of the sensitive data. Sharing of information may be in the form of datasets or in any of the structured patterns like trees, graphs, lattices, etc., This paper propose a sanitization algorithm for protecting sensitive data in a structured frequent pattern(tree). Keywords: Rank Function, Restricted Node, Sanitization, Structured Pattern, Victim States. 1. INTRODUCTION Data mining is an emerging technology to provide various means for identifying the interesting and important knowledge from large data collections. When this knowledge is to be shared among various parties in decision making activities, the sensitive data is to be preserved by the parties concerned. In particular, when multiple companies want to share the customer’s buying behavior in a collaborative business environment that promote business, the sensitive information of the individual company should be protected against sharing. The information to be shared may be in the form of datasets, frequent itemsets, structured patterns or subsequences. Here structured pattern refers to substructures like graphs, trees or lattices that contain frequent itemsets[1]. Various approaches have been proposed so far to address this problem of preserving sensitive patterns. This paper propose an algorithm that is aimed to sanitize sensitive information in a frequent pattern tree(because trees exhibits the relationships among the itemsets more clearly) which leaves no trace for the counterpart or an adversary to extract the hidden information back, by blocking all possible inferences. In this article, section-II briefs the literature review; section-III states the definitions needed for the sanitization approach and algorithm presented in this article and section-IV gives the proposed algorithm. In section-V illustration with sample graphs are given and in section-VI the performance metrics are discussed with sample results. 2. LITERATURE REVIEW Due to wide applicability of the field data mining and in particular for the task of association rules, the focus has been more specific for the problem of protection of sensitive knowledge against inference and it has been addressed by various researchers[2-12]. This task is referred to as sanitization in [2] which blocks inference of sensitive rules that facilitate collaborators to mine independently their own data and then sharing some of the resulting patterns. The above work
  • 2. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 23 concentrate on hiding frequent itemsets in databases based on the support and/or confidence framework. In many situations, it would be more comfortable to share the information in the form of structured patterns like graphs, trees, lattices, etc instead of sharing the entire databases. In structured patterns when a particular sensitive pattern is to be removed, its supersets and subsets should also be removed in order to block the forward and backward references. The work presented in [7], proposes an algorithm(DSA) that sanitize sensitive information in Graphs and have compared the efficiency with that of Naïve approach. Naïve blocks only the forward inference attack; but DSA blocks both forward and backward inference attacks. But in DSA, the subsets of the sensitive pattern are chosen at random. In this situation, possibility is there for the removal of more number of patterns; because, when a subset pattern is removed, the other patterns associated with it would also be removed failing which would leave forward trace for the counterpart to infer the details of the hidden pattern. Hence, this random removal would reduce the data utility of the source dataset. To overcome this problem, the work proposed in this article presents an algorithm(RSS) for sanitizing sensitive information in structured pattern tree that use a rank function for reducing the computational complexity and legitimate information loss. In comparison with DSA, this algorithm completely blocks the forward and backward inference attacks by removing the sensitive information and its associated information in an optimized way by means of the rank function. 3. BASIC DEFINITIONS Tree: A Tree is a finite set of one or more nodes such that there is a specially designated node called the root and the remaining nodes are partitioned into n ≥ 0 disjoint sets T1, …Tn, where each of these nodes is a tree. The sets T1,..Tn are called the subtrees of the root[13]. Set-Enumeration (SE)-tree: It is a tool for representing and/or enumerating sets in a best-first fashion. The complete SE-tree systematically enumerates elements of a power-set using a pre- imposed order on the underlying set of elements. Structured Pattern Tree: A structured pattern tree denoted by T=(N, L) consists of nonempty set of frequent itemsets N, a set of links L that are ordered pairs of the elements of N such that for all nodes a, b Є N there is a link from a to b if a ∩ b = a and |b| - |a| = 1, where |x| is the size of the itemset x. Level: Let T=(N, L) be a structured pattern(frequent itemset) tree. The level k of an itemset x such that x Є N, is the length of the path connecting an 1-itemset (usually al level-0) to x. Height: Let T=(N, L) be a structured pattern tree. The height, h of T is the length of the maximum path connecting an 1-itemset a with any other itemset b, such that a,b Є N and a⊂ b. Delete: The deletion of a node x from Ti, is denoted as Del(x). The resulting Ti ’ is the same as Ti without the node x. In particular, if p1,..,pm , x, s1, ..., sn is the sibling sequence in a level of Ti, then p1, ...,pm , s1, ..., sn is the sibling sequence in Ti ’ . Negative Border Nodes: Negative border nodes possess the property of having all its members (proper subsets) are frequent. Problem state: Each node in the tree is a problem state. R-nodes: Nodes that are sensitive and to be restricted before allowing the structured pattern to be shared. P-nodes: Predecessor node(subsets) of R-nodes which are to be identified (in order to block forward inference) before selecting the particular nodes that are to be deleted.
  • 3. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 24 S-nodes: Successor nodes(supersets) of R-nodes which are to be identified (in order to block backward inference) before selecting the particular nodes that are to be deleted. Victim states: Problem states for which the path from P-node(s) at level-1(containing 2-itemsets) to R-node and/or to S-node(s) are to be searched to select nodes for deletion. V-node(s): Node(s) to be deleted selectively (based on rank function) among the victim states. Rank function - r(.): Choose P-node (of R-node) which leads to only one S-node (with single Primary Link); choose one at random when tie occurs. The search for victim nodes can often be speeded up by using the ranking function r(.) for all P-nodes. The ideal way to assign ranks would be on the basis of minimum additional computational cost needed when this P-node is to be removed. 4. ALGORITHM Rank-based Structured-pattern Sanitization(RSS): Input: Frequent Pattern Tree(T), Set of Restricted Nodes(R-nodes) Output: Sanitized Tree(T’) Begin Obtain height h of the input tree; identify ri Є R ( R-nodes to be restricted); //Select victim nodes// for each ri Є R { find level k; V_nodes[ ] ← ri ; if k > 0 { do while(k<=h) { obtain S-nodes of ri (ie supersets); V_nodes[ ] ← V_nodes[ ]+S-nodes(ri); } do while(k>=1) { obtain P-nodes of ri (ie subsets ); V_nodes[ ] ← V_nodes[ ]+P-node that satisfy r(.); } } delete V_nodes[ ]; } T’←T; End
  • 4. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 25 5. ILLUSTRATION A sample frequent pattern SE-tree is given in Fig.1. Let the node to be protected(R-node) is the one with itemset abc(dark-filled in Fig.2); When this is marked for deletion(V-nodes), conventionaly it becomes infrequent. As per antimonotone property of frequent itemsets, if a set cannot pass a test, all of its supersets will fail the same test as well. Hence all of its supersets(S- nodes) are to be identified and deleted until the level equals the height of the tree. In this example, node abcd (shaded) is the superset of abc and so it is marked for deletion(V-nodes). Deletion of R-node and its supersets may completely hide the details of the sensitive data(Restricted nodes) and this ensures the blocking of backward inference of R-node. Morever, the negative border nodes are also to be deleted to completely block the future inference of the sensitive data. This can be achieved by identifying the Predecessor nodes(P- node) of R-node and suitably removing them by means of rank function-r(.) defined earlier. In this example, abc has two P-nodes, ab and ac which are having primarly links and of them as ac(shaded) has only one primary link, it is marked for deletion(V-nodes) with all its successors(in this case, acd). Refer Fig.2. Finally delete all victim nodes and thus the sanitized frequent pattern tree to be shared is resulted (the one given Fig.3) and hence forward inference is also blocked. On the contrary, if ab would have been chosen as victim node, then three more nodes would have been additionally removed which would result in more information loss and utility loss. Hence the rank function used in this approach sanitizes the structured frequent pattern tree with reduced information loss and utility loss. However, the nodes at level-0 (1-itemsets) are not deleted in any way and this preserves the distinct items in the given structured frequent pattern tree. FIGURE 1: Frequent Pattern Tree before Sanitization. a b c d e ab ac ad bc bd cd de abc abd acd ade bde be abcd abde ɸ bcd ae abe Primary Link Secondary Link
  • 5. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 26 a b c d e ab ad bc bd cd de abd ade bde be abde ɸ bcd ae abe FIGURE 3: Frequent Pattern Tree after Sanitization. a b c d e ab ac ad bc bd cd de abc abd acd ade bde be abcd abde ɸ bcd ae abe FIGURE 2: Frequent Pattern Tree with Victim Nodes.
  • 6. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 27 6. EXPERIMENTAL ANALYSIS The algorithm was tested for real dataset T10I4D100K[14] with number of transactions ranging from 1K to 10K and number of restricted nodes from 1 to 5. The test run was made on Intel core i5 processor with 2.3 GHz speed and 4GB RAM operating on 32 bit OS; The implementation of the proposed algorithm was done with windows 7 - Netbeans 6.9.1 - SQL 2005. The frequent patterns were obtained using Matrix Apriori[15], which requires only two scans of original database and uses simpler data structures. The efficiency of this approach is studied based on the measures given below and it has been compared (Figures 4 to 7) with the previously proposed algorithms IMA, PMA, TMA[9-12] which sanitizes the sensitive patterns(itemsets) in the source datasets. Dissimilarity(dif) : The dissimilarity between the original(D) and sanitized(D’) databases is measured in terms of their contents which can be measured by the formula, dif(D, D’) = x where fx(i) represents the i th item in the dataset X. This approach has very low percentage of dissimilarity and this shows that information loss is very low and so the utility is well preserved. From the fig.4 &5, it is observed that the proposed algorithm, RSS has very low dissimilarity in comparison with previous algorithms. However, when the no. of transactions are increased, the dissimilarity gets increased; this is due to the removal of subsets(with its associated nodes) of the sensitive nodes for blocking backward inference attack and it is observed to be less than 5%. CPU Time: The execution time is tested for the proposed algorithm by varying the number of nodes to be restricted. Fig.6 & 7 shows that the execution time required for RSS algorithm is low in comparison with the other algorithms. It is also observed that execution time is minimum, when the no. of transactions in the source dataset is more. However, time is not a significant criteria as the sanitization is done offline. FIGURE 4: Dissimilarity (varying no.of rules). FIGURE 5: Dissimilarity (varying no.of transactions). FIGURE 6: Execution Time (varying no.of rules). FIGURE 7: Execution Time (varying no.of transactions).
  • 7. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 28 Scalability: In order to effectively hide sensitive knowledge in patterns, the sanitization algorithms must be efficient and scalable which means the running time of any sanitizing algorithm must be predictable and acceptable. The efficiency and scalability of the proposed approach is proved below: Theorem: The running time of the Rank-based Structured-pattern Sanitization(RSS) approach is at least O[r(l+s)]; where r is the number of restrictive nodes(R-nodes), l is the number of preceding levels that have subsets of R-nodes and s is the number of S-nodes(supersets) of R-nodes. Proof : Let T be a given Structured frequent pattern tree with N being the total number of nodes in T; r be the number of sensitive nodes(R-nodes) to be restricted among N; l be the number of preceding levels of R-nodes and s be the number of S-nodes(supersets) of R-nodes in T. The proposed approach finds the height of the given tree. For every given R-node, find the victim states which are the collection of its S-nodes(supersets) and P-nodes(subsets) that lead with only one primary link for their own successors. As this approach satisfies anti-monotone property, all s S-nodes are victim nodes and to be deleted to block the backward inferences. However among the P-nodes(subsets), at each preceding level (other than level-0) the node(subset) which forms as a single primary link for its successors is to be obtained and deleted (with all its successors) in order to block all forward inferences; this selection process is quiet straightforward and it gets repeated for all R-nodes. This algorithm makes use of both depth-wise and breadth-wise search which requires atleast O(l+s) computational complexity for every R-node. Hence, the running time of proposed algorithm for k R-nodes is atleast O[r(l+s)], which is linear and better than O(n 2 ), O(n 3 ), O(2 n ), O(n log N). 7. CONCLUSION The proposed algorithm in this work sanitizes the structured frequent pattern tree in an optimal way, by using a rank function that reduces the computational complexity as well as the information loss and utility loss. Moreover, this approach blocks all the inference channels of the restrictive patterns in both forward and backward directions leaving no trace of the nodes that are restricted(removed) before sharing. This simulation process facilitates the task of sanitizing the structured pattern with different set of restricted information when it is to be shared between different set of collaborators. However, when the database is large, it is sometimes unrealistic to construct a main-memory based pattern tree. The proposed algorithm sanitizes patterns in static dataset and also the sanitization is done offline due to the offline decision analysis of the restricted rules. But further effort is being taken to apply optimized heuristic approach to sanitize continuous and dynamic dataset. 8. REFERENCES [1] J.Han, M.Kamber, Data Mining Concepts and Techniches, Oxford University Press, 2009. [2] M.Atallah, E.Bertino, A.Elmagarmid, M.Ibrahim and V.Verykios “Disclosure Limitation of Sensitive Rules”, Proc. of IEEE Knowledge and Data Engineering Workshop, pages 45–52, Chicago, Illinois, Nov 1999. [3] E.Dasseni, V.S.Verykios, A.K.Elmagarmid & E.Bertino, “Hiding Association Rules by Using Confidence and Support”, Proc. of the 4th Information Hiding Workshop, pages 369– 383, Pittsburg, PA, Apr 2001. [4] Y.Saygin, V.S.Verykios, and C.Clifton, “Using Unknowns to Prevent Discovery of Association Rules”, SIGMOD Record, 30(4):45–54, Dec 2001.
  • 8. Cynthia Selvi P & Mohamed Shanavas A.R International Journal of Data Engineering (IJDE), Volume (5) : Issue (3) : 2014 29 [5] S.R.M.Oliveira, and O.R.Zaiane, “Privacy preserving Frequent Itemset Mining”, Proc. of the IEEE ICDM Workshop on Privacy, Security, and Data Mining, Pages 43-54, Maebashi City, Japan, Dec 2002. [6] S.R.M.Oliveira, and O.R.Zaiane, “An Efficient One-Scan Sanitization for Improving the Balance between Privacy and Knowledge Discovery”, Technical Report TR 03-15, Jun 2003. [7] S.R.M.Oliveira, and O.R.Zaiane, “Secure Association Rule Mining”, Proc. of the 8 th Pacific- Asia Conference on Knowledge Discovery and Data Mining(PAKDD’04), Pages 74-85, Sydney, Australia, May 2004.. [8] B.Yildz, and B.Ergenc, “Hiding Sensitive Predictive Frequent Itemsets”, Proc. of the International MultiConference of Engineers and Computer Scientists 2011, Vol-I. [9] P.Cynthia Selvi, A.R.Mohamed Shanavas, “An effective Heuristic Approach for Hiding Sensitive Patterns in Databases”, International Organization of Scientific Research-Journal of Computer Engineering(IOSRJCE) Vol. 5, Issue 1(Sep-Oct 2012), PP 06-11. [10] P.Cynthia Selvi, A.R.Mohamed Shanavas, “An Improved Item-based Maxcover Algorithm to protect Sensitive Patterns in Large Databases”, International Organization of Scientific Research-Journal of Computer Engineering(IOSRJCE) Vol.14, Issue 4, Oct 2013, Pages 1-5. [11] P.Cynthia Selvi, A.R.Mohamed Shanavas, “Output Privacy Protection With Pattern-Based Heuristic Algorithm”, International Journal of Computer Science & Information Technology(IJCSIT) Vol 6, No 2, Apr 2014, Pages 141 – 152. [12] P.Cynthia Selvi, A.R.Mohamed Shanavas, “Towards Information Privacy Using Transaction- Based Maxcover Algorithm”, World Applied Sciences Journal 29 (Data Mining and Soft Computing Techniques): 06-11, 2014. [13] Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, Fundamentals of Computer Algorithms, Galgotia Pub. Pvt. Ltd, Delhi, 1999. [14] The Dataset used in this work for experimental analysis was generated using the generator from IBM Almaden Quest research group and is publicly available from http://fimi.ua.ac.be/data/. [15] J.Pavon, S.Viana, S.Gomez, “Matrix Apriori: speeding up the search for frequent patterns”, Proc. 24th IASTED International Conference on Databases and Applications 2006, pp. 75-82.