Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these algorithms are based on item-restriction methods; that is, removing items from some transactions in order to hide sensitive frequent itemsets. The infancy of this area has not produced clear methods neither evaluated those few available. However, determining what is most effective in protecting sensitive itemsets while not hiding non-sensitive ones as a side effect remains a crucial research issue. This paper introduces two new techniques that deal with scenarios where many itemsets of different sizes are sensitive. We empirically evaluate our two sanitization techniques and compare their efficiency as well as which has the minimum effect on the non-sensitive frequent itemsets. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
HajYasien, A., & Estivill-Castro, V. (2006). Two new techniques for hiding sensitive itemsets and their empirical evaluation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4081 LNCS, pp. 302–311). Springer Verlag. https://doi.org/10.1007/11823728_29
Mendeley helps you to discover research relevant for your work.