Privacy Preserving Association Rule Mining Using Binary Encoded NSGA-II

被引:6
作者
Cheng, Peng [1 ]
Pan, Jeng-Shyang [1 ]
Lin, Chun-Wei [1 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
来源
TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING | 2014年 / 8643卷
关键词
Privacy preserving data mining; Association rule mining; Evolutionary multi-objective optimization; EMO;
D O I
10.1007/978-3-319-13186-3_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When people utilize data mining techniques to discover useful knowledge behind a large database; they also have the requirement to preserve some information so as not to be mined out, such as sensitive or private association rules, classification tree and the like. A feasible way to address this problem is to sanitize the database to conceal sensitive information. In this paper, we focus on privacy preserving in association rule mining. In light of the tradeoff within the side effects accompanying the hiding process, we tackle this problem from a point view of multi-objective optimization. A novel association rule hiding approach was proposed based on evolutionary multi-objective optimization (EMO) algorithm. The binary encoding scheme was adopted in the EMO algorithm. Three side effects, including sensitive rules not hidden, nonsensitive lost rules and spurious rules were formulated as objectives to be minimized. The NSGA II algorithm, a well established EMO algorithm, was utilized to find a suitable subset of transactions to modify by removing items so that the three side effects are minimized. Experiment results were reported to show the effectiveness of the proposed approach.
引用
收藏
页码:87 / 99
页数:13
相关论文
共 15 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[3]   Dare to share: Protecting sensitive knowledge with data sanitization [J].
Amiri, Ali .
DECISION SUPPORT SYSTEMS, 2007, 43 (01) :181-191
[4]  
[Anonymous], 1999, KDEX WORKSH, DOI [10.1109/KDEX.1999.836532, DOI 10.1109/KDEX.1999.836532]
[5]  
Bleuler S, 2003, LECT NOTES COMPUT SC, V2632, P494
[6]  
BODON F, 2003, IEEE ICDM WORKSH FRE
[7]  
Bodon F., 2004, P IEEE ICDM WORKSH F
[8]  
Dasseni E., 2001, IHW 01, P369, DOI DOI 10.1007/3-540-45496-9_27
[9]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[10]   Exact Knowledge Hiding through Database Extension [J].
Gkoulalas-Divanis, Aris ;
Verykios, Vassilios S. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (05) :699-713