Hiding collaborative recommendation association rules on horizontally partitioned data

被引:0
作者
Wang, Shyue-Liang [1 ]
Lai, Ting-Zheng [3 ]
Hong, Tzung-Pei [2 ]
Wu, Yu-Lung [3 ]
机构
[1] Natl Univ Kaohsiung, Dept Informat Management, Kaohsiung 81148, Taiwan
[2] Natl Univ Kaohsiung, Dept Comp Sci & Informat Engn, Kaohsiung 81148, Taiwan
[3] I Shou Univ, Inst Informat Management, Kaohsiung 84001, Taiwan
关键词
Privacy preserving; data mining; collaborative recommendation; association rule; horizontally partitioned; PRIVACY PRESERVING DATA;
D O I
10.3233/IDA-2010-0408
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The study of privacy preserving data mining has become more important in recent years due to the increasing amount of personal data in public, the increasing sophistication of data mining algorithms to leverage this information, and the increasing concern of privacy breaches. Association rule hiding in which some of the association rules are suppressed in order to preserve privacy has been identified as a practical privacy preserving application [5,9,12,16,19-21,23,25,28-31]. Most current association rule hiding techniques assume that the data to be sanitized are in one single data set. However, in the real world, data may exist in distributed environment and owned by non-trusting parties that might be willing to collaborate. In this work, we propose a framework to hide collaborative recommendation association rules where the data sets are horizontally partitioned and owned by non-trusting parties. Algorithms to hide the collaborative recommendation association rules and to merge the sanitized data sets are introduced. Performance and various side effects of the proposed approach are analyzed numerically. Comparisons with trusting-third-party approach are reported. The proposed non-trusting-third-party approach shows better processing time, with similar side effects.
引用
收藏
页码:47 / 67
页数:21
相关论文
共 33 条
  • [1] Aggarwal CC, 2008, ADV DATABASE SYST, V34, P1, DOI 10.1007/978-0-387-70992-5
  • [2] Agrawal D., 2001, PROC 20 ACM SIGMOD S, P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
  • [3] Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
  • [4] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [5] [Anonymous], 2002, Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, DOI DOI 10.1145/775047.775080
  • [6] [Anonymous], 2002, SIGKDD EXPLORATION
  • [7] ATALLAH A, 1999, P IEEE KNOWL DAT ENG, P45
  • [8] Cliff William H., 1996, American Journal of Physiology, V270, pS19
  • [9] Clifton C., 2000, Journal of Computer Security, V8, P281
  • [10] Dasseni E., 2001, IHW 01, P369, DOI DOI 10.1007/3-540-45496-9_27