Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms

52Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA) mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects.

References Powered by Scopus

Induction of Decision Trees

15715Citations
N/AReaders
Get full text

Privacy-preserving data mining

2391Citations
N/AReaders
Get full text

Mining frequent patterns without candidate generation: A frequent-pattern tree approach

2218Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A sanitization approach for hiding sensitive itemsets based on particle swarm optimization

88Citations
N/AReaders
Get full text

A nutrient recommendation system for soil fertilization based on evolutionary computation

83Citations
N/AReaders
Get full text

A grid-based swarm intelligence algorithm for privacy-preserving data mining

68Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Lin, C. W., Zhang, B., Yang, K. T., & Hong, T. P. (2014). Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Scientific World Journal, 2014. https://doi.org/10.1155/2014/398269

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

77%

Professor / Associate Prof. 2

15%

Lecturer / Post doc 1

8%

Readers' Discipline

Tooltip

Computer Science 13

81%

Social Sciences 1

6%

Engineering 1

6%

Psychology 1

6%

Save time finding and organizing research with Mendeley

Sign up for free