Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which studies the problem of hiding sensitive association rules from within the data.
Association Rule Hiding for Data Mining addresses the optimization problem of “hiding” sensitive association rules which due to its combinatorial nature admits a number of heuristic solutions that will be proposed and presented in this book. Exact solutions of increased time complexity that have been proposed recently are also presented as well as a number of computationally efficient (parallel) approaches that alleviate time complexity problems, along with a discussion regarding unsolved problems and future directions. Specific examples are provided throughout this book to help the reader study, assimilate and appreciate the important aspects of this challenging problem.
Association Rule Hiding for Data Mining is designed for researchers, professors and advanced-level students in computer science studying privacy preserving data mining, association rule mining, and data mining. This book is also suitable for practitioners working in this industry.
Author(s): Aris Gkoulalas-Divanis, Vassilios S. Verykios (auth.)
Series: Advances in Database Systems 41
Edition: 1
Publisher: Springer US
Year: 2010
Language: English
Pages: 138
Tags: Database Management; Information Systems Applications (incl.Internet); Artificial Intelligence (incl. Robotics); Data Structures, Cryptology and Information Theory; Algorithm Analysis and Problem Complexity; Performance and Reliability
Front Matter....Pages i-xx
Front Matter....Pages 1-1
Introduction....Pages 3-8
Background....Pages 9-15
Classes of Association Rule Hiding Methodologies....Pages 17-20
Other Knowledge Hiding Methodologies....Pages 21-24
Summary....Pages 25-25
Front Matter....Pages 28-28
Distortion Schemes....Pages 29-33
Blocking Schemes....Pages 35-36
Summary....Pages 37-37
Front Matter....Pages 40-40
Border Revision for Knowledge Hiding....Pages 41-46
BBA Algorithm....Pages 47-52
Max-Min Algorithms....Pages 53-58
Summary....Pages 59-59
Front Matter....Pages 62-62
Menon's Algorithm....Pages 63-70
Inline Algorithm....Pages 71-82
Two-Phase Iterative Algorithm....Pages 83-92
Hybrid Algorithm....Pages 93-118
Parallelization Framework for Exact Hiding....Pages 119-130
Quantifying the Privacy of Exact Hiding Algorithms....Pages 131-134
Summary....Pages 135-135
Front Matter....Pages 138-138
Conclusions....Pages 139-141
Front Matter....Pages 138-138
Roadmap to Future Work....Pages 143-144
Back Matter....Pages 145-150