An efficient algorithm for Hiding High Utility Sequential Patterns

被引:21
作者
Bac Le [1 ]
Duy-Tai Dinh [2 ]
Van-Nam Huynh [2 ]
Quang-Minh Nguyen [3 ]
Fournier-Viger, Philippe [4 ]
机构
[1] Univ Sci, VNU HCMC, Ho Chi Minh City, Vietnam
[2] Japan Adv Inst Sci & Technol, Nomi, Japan
[3] Acad Cryptog Tech, Ho Chi Minh City, Vietnam
[4] Harbin Inst Technol, Sch Humanities & Social Sci, Shenzhen, Peoples R China
关键词
Data mining; Privacy preserving data mining; High-utility sequential pattern mining; High-utility sequential pattern hiding; ASSOCIATION RULES;
D O I
10.1016/j.ijar.2018.01.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
High Utility Sequential Patterns (HUSP) are a type of patterns that can be found in data collected in many domains such as business, marketing and retail. Two critical topics related to HUSP are: HUSP mining (HUSPM) and HUSP Hiding (HUSPH). HUSPM algorithms are designed to discover all sequential patterns that have a utility greater than or equal to a minimum utility threshold in a sequence database. HUSPH algorithms, by contrast, conceal all HUSP so that competitors cannot find them in shared databases. This paper focuses on HUSPH. It proposes an algorithm named HUS-Hiding to efficiently hide all HUSP. An extensive experimental evaluation is conducted on six real-life datasets to evaluate the performance of the proposed algorithm. According to the experimental results, the designed algorithm is more effective than three state-of-the-art algorithms in terms of runtime, memory usage and hiding accuracy. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:77 / 92
页数:16
相关论文
共 32 条
[1]  
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P11
[2]  
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[3]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[4]   A Novel Approach for Mining High-Utility Sequential Patterns in Sequence Databases [J].
Ahmed, Chowdhury Farhan ;
Tanbeer, Syed Khairuzzaman ;
Jeong, Byeong-Soo .
ETRI JOURNAL, 2010, 32 (05) :676-686
[5]  
[Anonymous], 2012, CAPGEMINI REPORTS, P1
[6]  
Ayres J., 2002, P ACM SIGKDD INT C K, P429
[7]  
Bai-En Shie, 2012, Advanced Research in Applied Artificial Intelligence. Proceedings 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2012, P616, DOI 10.1007/978-3-642-31087-4_63
[8]   An Efficient Method for Hiding High Utility Itemsets [J].
Bay Vo ;
Lin, Chun-Wei ;
Hong, Tzung-Pei ;
Vu, Vinh V. ;
Minh Nguyen ;
Bac Le .
ADVANCED METHODS AND TECHNOLOGIES FOR AGENT AND MULTI-AGENT SYSTEMS, 2013, 252 :356-363
[9]  
Bertino E, 2008, ADV DATABASE SYST, V34, P183
[10]  
Dinh T., 2015, P 6 INT S INF COMM T, P121