An Efficient Method for Hiding High Utility Itemsets

被引:1
作者
Bay Vo [1 ]
Lin, Chun-Wei [2 ]
Hong, Tzung-Pei [3 ]
Vu, Vinh V. [4 ]
Minh Nguyen [5 ]
Bac Le [6 ]
机构
[1] Informat Technol Coll, 12 Trinh Dinh Thao, Tan Phu, Ho Chi Minh, Vietnam
[2] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, Innovat Informat Ind Res Ctr, Harbin, Peoples R China
[3] Natl Univ Kaohsiung, Dept CSIE, Kaohsiung, Taiwan
[4] Univ Food Ind, Ho Chi Minh City, Vietnam
[5] Inst Informat Technol, Ho Chi Minh City, Vietnam
[6] Univ Sci, Ho Chi Minh City, Vietnam
来源
ADVANCED METHODS AND TECHNOLOGIES FOR AGENT AND MULTI-AGENT SYSTEMS | 2013年 / 252卷
关键词
data mining; high utility itemset; privacy preserving; utility; DISCOVERY;
D O I
10.3233/978-1-61499-254-7-356
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an algorithm to hide quickly high utility sensitive itemsets. To reduce the execution time, when an item from the sensitive itemset is selected, the rated value is calculated from each transaction containing this item and all values which need be hidden are modified at the same time. Experimental results show that the proposed algorithm improves significantly the runtime.
引用
收藏
页码:356 / 363
页数:8
相关论文
共 16 条
[1]  
Ahmed CF, 2009, LECT NOTES ARTIF INT, V5476, P749, DOI 10.1007/978-3-642-01307-2_76
[2]   Dare to share: Protecting sensitive knowledge with data sanitization [J].
Amiri, Ali .
DECISION SUPPORT SYSTEMS, 2007, 43 (01) :181-191
[3]  
[Anonymous], 1999, KDEX WORKSH, DOI [10.1109/KDEX.1999.836532, DOI 10.1109/KDEX.1999.836532]
[4]  
Bac Le, 2011, International Journal of Intelligent Information and Database Systems, V5, P164, DOI 10.1504/IJIIDS.2011.038970
[5]  
Dasseni E., 2001, IHW 01, P369, DOI DOI 10.1007/3-540-45496-9_27
[6]   Privacy preserving mining of association rules [J].
Evfimievski, A ;
Srikant, R ;
Agrawal, R ;
Gehrke, J .
INFORMATION SYSTEMS, 2004, 29 (04) :343-364
[7]  
Hong Tae-Kee, 2010, Int J Anal Chem, V2010, P602939, DOI 10.1155/2010/602939
[8]  
Hong TP, 2011, IEEE SYS MAN CYBERN, P2325, DOI 10.1109/ICSMC.2011.6084025
[9]  
Liu Y, 2005, LECT NOTES ARTIF INT, V3518, P689
[10]  
Oliveira S.R.M., 2002, P IEEE INT C PRIVACY, P43