Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics

被引:34
作者
Zhang, Lili [1 ,2 ]
Wang, Wenjie [3 ]
Zhang, Yuqing [1 ,3 ,4 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Henan Univ Sci & Technol, Informat Engn Coll, Henan Joint Int Res Lab Cyberspace Secur Applicat, Luoyang 471023, Peoples R China
[3] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing 100049, Peoples R China
[4] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
关键词
Data mining; privacy preserving; association rule mining; association rule hiding; frequent itemsets; privacy metrics; data utility metrics; complexity metrics;
D O I
10.1109/ACCESS.2019.2908452
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last decades, pervasive computing is generating a growing quantity of data. Data mining (DM) technology has become increasingly popular. However, the excessive collection and analysis of data may violate the privacy of individuals and organizations, which raises privacy concern. Therefore, a new research area known as privacy-preserving DM (PPDM) has emerged and attracted the attention of many researchers who are interested in preventing privacy disclosure during DM. In this paper, we provide a comprehensive review of studies on a specific PPDM, known as privacy-preserving association rule mining (PPARM). We present a detailed taxonomy for the existing PPARM algorithms according to multiple dimensions and then conduct a survey of the most relevant PPARM techniques from the literature. Moreover, we survey and elaborate on each type of metrics used to evaluate PPARM algorithms. Finally, we summarize some conclusions and come up with some future directions and challenges.
引用
收藏
页码:45032 / 45047
页数:16
相关论文
共 76 条
  • [1] Association rule hiding using cuckoo optimization algorithm
    Afshari, Mahtab Hossein
    Dehkordi, Mohammad Naderi
    Akbari, Mehdi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2016, 64 : 340 - 351
  • [2] Comprehensive Survey on Privacy Preserving Association Rule Mining: Models, Approaches, Techniques and Algorithms
    Alwatban, Ibrahim S.
    Emam, Ahmed Z.
    [J]. INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2014, 23 (05)
  • [3] Dare to share: Protecting sensitive knowledge with data sanitization
    Amiri, Ali
    [J]. DECISION SUPPORT SYSTEMS, 2007, 43 (01) : 181 - 191
  • [4] [Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [DOI 10.1145/772862.772867, 10.1145/772862.772867]
  • [5] [Anonymous], P 20 ACM SIGMOD SIGA
  • [6] Atallah M., 1999, P 1999 WORKSH KNOWL, P45, DOI [10.1109/KDEX.1999.836532, DOI 10.1109/KDEX.1999.836532]
  • [7] Bertino E, 2005, LECT NOTES COMPUT SC, V3589, P418, DOI 10.1007/11546849_41
  • [8] Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir's secret sharing scheme
    Chahar, Harendra
    Keshavamurthy, B. N.
    Modi, Chirag
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (12): : 1997 - 2007
  • [9] CHEN HL, 2004, PROC 4TH INT CONF DA, P47
  • [10] Privacy preservation through a greedy, distortion-based rule-hiding method
    Cheng, Peng
    Roddick, John F.
    Chu, Shu-Chuan
    Lin, Chun-Wei
    [J]. APPLIED INTELLIGENCE, 2016, 44 (02) : 295 - 306