Privacy preserving big data mining: association rule hiding using fuzzy logic approach

Privacy preserving big data mining: association rule hiding using fuzzy logic approach

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Recently, privacy preserving data mining has been studied widely. Association rule mining can cause potential threat toward privacy of data. So, association rule hiding techniques are employed to avoid the risk of sensitive knowledge leakage. Many researches have been done on association rule hiding, but most of them focus on proposing algorithms with least side effect for static databases (with no new data entrance), while now the authors confront with streaming data which are continuous data. Furthermore, in the age of big data, it is necessary to optimise existing methods to be executable for large volume of data. In this study, data anonymisation is used to fit the proposed model for big data mining. Besides, special features of big data such as velocity make it necessary to consider each rule as a sensitive association rule with an appropriate membership degree. Furthermore, parallelisation techniques which are embedded in the proposed model, can help to speed up data mining process.


    1. 1)
      • 1. Philip, C.L.C., Zh, C.-Y.: ‘Data-intensive applications, challenges, techniques and technologies: a survey on big data’, Inf. Sci., 2014, 275, pp. 314347.
    2. 2)
      • 2. Ohbyung, K., Namyeon, L., Bongsik, S.: ‘Data quality management, data usage experience and acquisition intention of big data analytics’, Int. J. Inf. Manage., 2014, 34, (3), pp. 387394.
    3. 3)
      • 3. Alfredo, C., Carson, K.S.L., Richard, K.M.: ‘Mining constrained frequent item-sets from distributed uncertain data’, Future Gener. Comput. Syst., 2014, 37, pp. 117126.
    4. 4)
      • 4. Xuyun, Z., Chang, L., Surya, N.S., et al: ‘A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud’, J. Comput. Syst. Sci., 2014, 80, (5), pp. 10081020.
    5. 5)
      • 5. Yaping, L., Minghua, C., Qiwei, L., et al: ‘Enabling multilevel trust in privacy preserving data mining’, IEEE Trans. Knowl. Data Eng., 2012, 24, (9), pp. 15891612.
    6. 6)
      • 6. Yi-Huang, W., Chia-Ming, C., Arbee, L.P.C.: ‘Hiding sensitive association rules with limited side effects’, IEEE Trans. Knowl. Data Eng., 2007, 19, (1), pp. 2942.
    7. 7)
      • 7. Aris, G.D., Vassilios, S.V.: ‘Exact knowledge hiding through database extension’, IEEE Trans. Knowl. Data Eng., 2009, 21, (5), pp. 699713.
    8. 8)
      • 8. Hai, Q.C., Somjit, A.I., Huy, X.N., et al: ‘Association rule hiding in risk management for retail supply chain collaboration’, Comput. Ind., 2013, 64, (4), pp. 776784.
    9. 9)
      • 9. Yu-Chiang, L., Jieh-Shan, Y., Chin-Chen, C.: ‘MCIF: an effective sanitization algorithm for hiding sensitive patterns on data mining’, Adv. Eng. Inf., 2007, 21, (3), pp. 269280.
    10. 10)
      • 10. Bettahally, N.K., Durga, T., Bhavani, K.E.: ‘Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams’, J. Netw. Comput. Appl., 2012, 35, (3), pp. 11161129.
    11. 11)
      • 11. Xindong, W., Xingquan, Z., Gong-Qing, W., et al: ‘Data mining with big data’, IEEE Trans. Knowl. Data Eng., 2014, 26, (1), pp. 97107.
    12. 12)
      • 12. Mehmet, E.N., Muhammed, Z.G.: ‘Hybrid K-anonymity’, Comput. Secur., 2014, 44, pp. 5163.
    13. 13)
      • 13. Bingdong, L., Esra, E., Mehmet, H.G., et al: ‘An overview of anonymity technology usage’, Comput. Commun., 2013, 36, (12), pp. 12691283.
    14. 14)
      • 14. Anna, M., Gennady, A., Natalia, A., et al: ‘Movement data anonymity through generalization’, Trans. Data Priv., 2010, 3, (2), pp. 131.
    15. 15)
      • 15. Slava, K., Lior, R., Yuval, E., et al: ‘Efficient multidimensional suppression for K-anonymity’, IEEE Trans. Knowl. Data Eng., 2010, 22, (3), pp. 334347.
    16. 16)
      • 16. Gaofen, Z., Yun, Y., Xiao, L., et al: ‘A time-series pattern based noise generation strategy for privacy protection in cloud computing’. Int. Symp. Cluster, Cloud and Grid Computing (CCGrid), Ottawa, Canada, May 2012, pp. 458465.
    17. 17)
      • 17. Hui, W.: ‘Quality measurement for association rule hiding’, AASRI Procedia, 2013, 5, pp. 228234.
    18. 18)
      • 18. George, V.M., Vassilios, S.V.: ‘A MaxMin approach for hiding frequent item sets’, Data Knowl. Eng., 2008, 65, (1), pp. 7589.
    19. 19)
      • 19. Shyue-Liang, W., Bhavesh, P., Ayat, J.: ‘Hiding informative association rule sets’, Expert Syst. Appl., 2007, 33, (2), pp. 316323.
    20. 20)
      • 20. Ching-Yao, W., Shian-Shyong, T., Tzung-Pei, H.: ‘Flexible online association rule mining based on multidimensional pattern relations’, Inf. Sci., 2006, 167, (12), pp. 17521780.
    21. 21)
      • 21. Elena, D., Vassilios, S.V., Ahmed, K.E., et al: ‘Hiding association rules by using confidence and support’, Inf. Hiding Lect. Notes Comput. Sci., 2007, 2137, pp. 369383.
    22. 22)
      • 22., accessed 10th September 2015.

Related content

This is a required field
Please enter a valid email address