DocumentCode :
3534801
Title :
Hiding sensitive association rules efficiently by introducing new variable hiding counter
Author :
Belwal, Ramesh Chandra ; Varshney, Jitendra ; Khan, Sohel Ahmed ; Sharma, Anand ; Bhattacharya, Mahua
Author_Institution :
I.I.I.T.M., Gwalior
Volume :
1
fYear :
2008
fDate :
12-15 Oct. 2008
Firstpage :
130
Lastpage :
134
Abstract :
We know that large database contain certain information that must be protected against unauthorized access. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. In this paper we discuss confidentiality issues of a broad category of association rules. Two important terms support and confidence are associated with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of confidentiality purposes. There are many approaches to hide certain association rules which take the support and confidence as a base for algorithms ([1, 2, 6] and many more). Our approach is a modification of ISL (increase support of LHS) and DSR (decrease support of RHS) and has some modifications so that it hides any desired association rule as previous work sometimes can not. Our work has the basis of reduction of support and confidence of sensitive rules but in our work we are not editing or disturbing the given database of transactions directly(as it is generally done in previous works) rather we are performing the same task indirectly bye modifying the some new introduced terms associated with database transactions and association rules. These new terms are Mconfidence (modified confidence), Msupport (modified support) and Hiding counter. Our algorithm use some modified definition of support and confidence so that it would hide any desired sensitive association rule without any side effect. Actually we are using the same method (as previously used method) of getting association rules but we are modifying the definitions of support and confidence.
Keywords :
authorisation; data mining; transaction processing; association rule hiding; data mining; database transactions; disclosure risk; information security; unauthorized access; Association rules; Clustering algorithms; Counting circuits; Data mining; Data privacy; Information management; Information technology; Protection; Technology management; Transaction databases; Association rule hiding; hiding counter; modified confidence; modified support;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Service Operations and Logistics, and Informatics, 2008. IEEE/SOLI 2008. IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-2012-4
Electronic_ISBN :
978-1-4244-2013-1
Type :
conf
DOI :
10.1109/SOLI.2008.4686377
Filename :
4686377
Link To Document :
بازگشت