Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Privacy preserving big data mining: association rule hiding using fuzzy logic approach

Recently, privacy preserving data mining has been studied widely. Association rule mining can cause potential threat toward privacy of data. So, association rule hiding techniques are employed to avoid the risk of sensitive knowledge leakage. Many researches have been done on association rule hiding, but most of them focus on proposing algorithms with least side effect for static databases (with no new data entrance), while now the authors confront with streaming data which are continuous data. Furthermore, in the age of big data, it is necessary to optimise existing methods to be executable for large volume of data. In this study, data anonymisation is used to fit the proposed model for big data mining. Besides, special features of big data such as velocity make it necessary to consider each rule as a sensitive association rule with an appropriate membership degree. Furthermore, parallelisation techniques which are embedded in the proposed model, can help to speed up data mining process.

References

    1. 1)
      • 10. Bettahally, N.K., Durga, T., Bhavani, K.E.: ‘Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams’, J. Netw. Comput. Appl., 2012, 35, (3), pp. 11161129.
    2. 2)
      • 3. Alfredo, C., Carson, K.S.L., Richard, K.M.: ‘Mining constrained frequent item-sets from distributed uncertain data’, Future Gener. Comput. Syst., 2014, 37, pp. 117126.
    3. 3)
      • 17. Hui, W.: ‘Quality measurement for association rule hiding’, AASRI Procedia, 2013, 5, pp. 228234.
    4. 4)
      • 16. Gaofen, Z., Yun, Y., Xiao, L., et al: ‘A time-series pattern based noise generation strategy for privacy protection in cloud computing’. Int. Symp. Cluster, Cloud and Grid Computing (CCGrid), Ottawa, Canada, May 2012, pp. 458465.
    5. 5)
      • 1. Philip, C.L.C., Zh, C.-Y.: ‘Data-intensive applications, challenges, techniques and technologies: a survey on big data’, Inf. Sci., 2014, 275, pp. 314347.
    6. 6)
      • 12. Mehmet, E.N., Muhammed, Z.G.: ‘Hybrid K-anonymity’, Comput. Secur., 2014, 44, pp. 5163.
    7. 7)
      • 9. Yu-Chiang, L., Jieh-Shan, Y., Chin-Chen, C.: ‘MCIF: an effective sanitization algorithm for hiding sensitive patterns on data mining’, Adv. Eng. Inf., 2007, 21, (3), pp. 269280.
    8. 8)
      • 8. Hai, Q.C., Somjit, A.I., Huy, X.N., et al: ‘Association rule hiding in risk management for retail supply chain collaboration’, Comput. Ind., 2013, 64, (4), pp. 776784.
    9. 9)
      • 7. Aris, G.D., Vassilios, S.V.: ‘Exact knowledge hiding through database extension’, IEEE Trans. Knowl. Data Eng., 2009, 21, (5), pp. 699713.
    10. 10)
      • 21. Elena, D., Vassilios, S.V., Ahmed, K.E., et al: ‘Hiding association rules by using confidence and support’, Inf. Hiding Lect. Notes Comput. Sci., 2007, 2137, pp. 369383.
    11. 11)
      • 19. Shyue-Liang, W., Bhavesh, P., Ayat, J.: ‘Hiding informative association rule sets’, Expert Syst. Appl., 2007, 33, (2), pp. 316323.
    12. 12)
      • 4. Xuyun, Z., Chang, L., Surya, N.S., et al: ‘A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud’, J. Comput. Syst. Sci., 2014, 80, (5), pp. 10081020.
    13. 13)
      • 2. Ohbyung, K., Namyeon, L., Bongsik, S.: ‘Data quality management, data usage experience and acquisition intention of big data analytics’, Int. J. Inf. Manage., 2014, 34, (3), pp. 387394.
    14. 14)
      • 14. Anna, M., Gennady, A., Natalia, A., et al: ‘Movement data anonymity through generalization’, Trans. Data Priv., 2010, 3, (2), pp. 131.
    15. 15)
      • 20. Ching-Yao, W., Shian-Shyong, T., Tzung-Pei, H.: ‘Flexible online association rule mining based on multidimensional pattern relations’, Inf. Sci., 2006, 167, (12), pp. 17521780.
    16. 16)
      • 11. Xindong, W., Xingquan, Z., Gong-Qing, W., et al: ‘Data mining with big data’, IEEE Trans. Knowl. Data Eng., 2014, 26, (1), pp. 97107.
    17. 17)
      • 18. George, V.M., Vassilios, S.V.: ‘A MaxMin approach for hiding frequent item sets’, Data Knowl. Eng., 2008, 65, (1), pp. 7589.
    18. 18)
      • 6. Yi-Huang, W., Chia-Ming, C., Arbee, L.P.C.: ‘Hiding sensitive association rules with limited side effects’, IEEE Trans. Knowl. Data Eng., 2007, 19, (1), pp. 2942.
    19. 19)
      • 13. Bingdong, L., Esra, E., Mehmet, H.G., et al: ‘An overview of anonymity technology usage’, Comput. Commun., 2013, 36, (12), pp. 12691283.
    20. 20)
      • 15. Slava, K., Lior, R., Yuval, E., et al: ‘Efficient multidimensional suppression for K-anonymity’, IEEE Trans. Knowl. Data Eng., 2010, 22, (3), pp. 334347.
    21. 21)
      • 22. http://hortonworks.com/hadoop/ambari/, accessed 10th September 2015.
    22. 22)
      • 5. Yaping, L., Minghua, C., Qiwei, L., et al: ‘Enabling multilevel trust in privacy preserving data mining’, IEEE Trans. Knowl. Data Eng., 2012, 24, (9), pp. 15891612.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0545
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0545
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address