Two new techniques for hiding sensitive itemsets and their empirical evaluation

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these algorithms are based on item-restriction methods; that is, removing items from some transactions in order to hide sensitive frequent itemsets. The infancy of this area has not produced clear methods neither evaluated those few available. However, determining what is most effective in protecting sensitive itemsets while not hiding non-sensitive ones as a side effect remains a crucial research issue. This paper introduces two new techniques that deal with scenarios where many itemsets of different sizes are sensitive. We empirically evaluate our two sanitization techniques and compare their efficiency as well as which has the minimum effect on the non-sensitive frequent itemsets. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

HajYasien, A., & Estivill-Castro, V. (2006). Two new techniques for hiding sensitive itemsets and their empirical evaluation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4081 LNCS, pp. 302–311). Springer Verlag. https://doi.org/10.1007/11823728_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free