Open Access   Article Go Back

Heuristic Approach in Association Rule Hiding- A Study

S. Sharmila1 , S. Vijayarani2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 300-305, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.300305

Online published on May 31, 2019

Copyright © S. Sharmila, S. Vijayarani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Sharmila, S. Vijayarani, “Heuristic Approach in Association Rule Hiding- A Study,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.300-305, 2019.

MLA Style Citation: S. Sharmila, S. Vijayarani "Heuristic Approach in Association Rule Hiding- A Study." International Journal of Computer Sciences and Engineering 7.5 (2019): 300-305.

APA Style Citation: S. Sharmila, S. Vijayarani, (2019). Heuristic Approach in Association Rule Hiding- A Study. International Journal of Computer Sciences and Engineering, 7(5), 300-305.

BibTex Style Citation:
@article{Sharmila_2019,
author = {S. Sharmila, S. Vijayarani},
title = {Heuristic Approach in Association Rule Hiding- A Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {300-305},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4240},
doi = {https://doi.org/10.26438/ijcse/v7i5.300305}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.300305}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4240
TI - Heuristic Approach in Association Rule Hiding- A Study
T2 - International Journal of Computer Sciences and Engineering
AU - S. Sharmila, S. Vijayarani
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 300-305
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
422 288 downloads 127 downloads
  
  
           

Abstract

Privacy preserving data mining Extracts relevant knowledge from large amount of data and at the same time protect sensitive information from the data miners. People in business, hospitals, educational institutions, and banks need a secure and safe transaction of their data. To serve this need Privacy Preserving Data Mining (PPDM) was created. PPDM solves the problem related to designing accurate models about combined data without requiring the access to exact information in individual data record. PPDM is the most important research area for protecting the perceptive data or knowledge. The important technique of PPDM is Association rule hiding that protects the association rules generated by association rule mining. This study presents a survey of association rule hiding approach for preserving privacy of the user data. Association rule hiding methodology consists of five approaches namely Heuristic, Border, Exact, Cryptography and Reconstruction The study has briefly explained the Heuristic approach.

Key-Words / Index Term

Privacy preserving Data Mining, Association Rule Hiding approaches. Heuristic Approach

References

[1]. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16(4):434–447, 2004.
[2]. Inan and Y. Saygin. Privacy preserving spatio-temporal clustering on horizontally partitioned data. In Proceedings of the 8th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2006), pages 459–468, 2006.
[3]. Peng Cheng1,3 • John F. Roddick2 • Shu-Chuan Chu2 • Chun-Wei Lin1 Privacy preservation through a greedy, distortion-based rule-hiding method, Springer Science+Business Media New York 2015 , Appl Intell (2016) 44:295–306 DOI 10.1007/s10489-015-0671-0.
[4]. Telikani, A. Shahbahrami and R. Tavoli,Data sanitization in association rule mining based on impact factor, Journal of AI and Data Mining Vol 3, No 2, 131-140. 2015.
[5]. Syam Menon and Sumit Sarkar privacy and big data: scalable approaches to sanitize large transactional databases for sharing, big data & analytics in networked business MIS Quarterly Vol. 40 No. 4, pp. 963-981/December 2016.
[6]. Afrah Farea, Ali Karcı Applications of Assoiation Rules Hiding Heuristic Approaches, SİU-2015: Sinyal İşleme Ve İletişim Uygulamalari Kurultayi.
[7]. R.Hemalatha 2 M.Elamparithi Privacy Preserving Data Mining Using Sanitizing Algorithm, International Journal of Computer Science and Information Technologies, Vol. 6 (5) , 4174-4179, ISSN -0975-9646 2015.
[8]. Divya C. Kalariya , Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule International Journal of Computer Applications Volume 122 – No.8 (0975 – 8887), July 2015
[9]. Saad M. Darwish, Magda M. Madbouly, and Mohamed A. El-Hakeem, A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining, International Journal of Computer and Communication Engineering, Vol. 3, No. 4, July 2014.
[10]. Rahat Ali SHAH,Sohail ASGHAR Privacy preserving in association rules using a genetic algorithm , Turkish Journal of Electrical Engineering & Computer Sciences, (2014) 22: 434 { 450, doi:10.3906/elk-1206-66.
[11]. Dr.Vijayalakshmi M N1 S.Anupama Kumar2 Kavyashree BN3, Investigating Interesting Rules Using Association Mining for Educational Data, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, February 2014.
[12]. Tapan Sirole ,Jaytrilok Choudhary , A Survey of Various Methodologies for Hiding Sensitive Association Rules, International Journal of Computer Applications (0975 – 8887) Volume 96– No.18, June 2014.
[13]. Dhiren R. Patel, Ph.D Khyati B. Jadav Jignesh Vania , A Survey on Association Rule Hiding Methods, International Journal of Computer Applications (0975 – 8887) Volume 82 – No 13, November 2013
[14]. Suma B. Suma B. Association Rule Hiding Methodologies: A Survey, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 6, June – 2013.
[15]. Dhyanendra Jain 1,Amit sinhal2,Neetesh Gupta3, Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s), International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.2, March 2012.
[16]. Shyue-LiangWang, Tzung-Pei Hong • Chun-Wei Lin •Kuo-Tung Yang, Using TF-IDF to hide sensitive itemsets, Appl Intell (2013) 38:502–510 DOI 10.1007/s10489-012-0377-5.
[17]. Nidhi Porwal, Sunil Kumar Mahaveer Singh , An Algorithm for Hiding Association Rules on Data Mining, National Conference on Communication Technologies & its impact on Next Generation Computing CTNGC 2012 Proceedings published by International Journal of Computer Applications® (IJCA).
[18]. Gwadera GLR, Gkoulalas-Divanis A (2013) Permutation-based sequential pattern hiding. In: IEEE International Conference on Data Mining (ICDM), pp 241–250
[19]. Mariscal, G., Marban, O. & Fernandez, C. (2010).A survey of data mining and knowledge discovery process models and methodologies. The Knowledge Engineering Review, vol. 5, no. 2, pp. 137-166.
[20]. Vignani, B. & Satapathy, S. C. (2014). D-pattern evolving and inner pattern evolving for high performance text mining. Advances in Intelligent Systems and Computing, vol. 247, pp. 501-507.
[21]. Jena, L. K., Kamila, N. & Mishra, S. (2014). Privacy preserving distributed data mining with evolutionary computing. Advances in Intelligent Systems and Computing, vol. 247, pp. 259-267.
[22]. Lijffijt, J., Papapetrou, P. & Puolamäki, K. (2014).A statistical significance testing approach to mining the most informative set of patterns. Data Mining and Knowledge Discovery, vol. 28, pp. 238-263.
[23]. Verykios, V. 2013. “Association Rule Hiding Methods,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery (3:1), pp. 28-36.
[24]. T. Tassa, “Secure Mining of Association Rules in Horizontally Distributed Databases”, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, (2014) April, pp. 970-983.
[25]. R. Nilesh, and P. b. Nilesh, S. H. Krupali, “Privacy Preserving in Association Rule mining”, international journal of advanced and innovative research (IJAIR), Vol.2, No. 4, 2013, pp. 2278-7844.
[26]. H.Hamilton, DBD: data mining projects", University of Regina Available at:http://www2.cs.uregina.ca/dbd/cs831/index.html, 2000{9, Last accessed: 15.03.2012
[27]. Maulesh R. Chhatrapati Shilpa Sherasiya Privacy Preserving Data Mining Using Heuristic Approach IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 10 | March 2015 ISSN (online): 2349-6010.
[28]. Saiyed Wafa Ahsan* R. K. Gupta A Heuristic Approach to Association Rule Mining International Journal of Advanced Research in Computer Science and Software Engineering. Volume 6, Issue 2, February 2016 ISSN: 2277 128X.
[29]. Hitesh Chhinkaniwala 1 and Dr. Sanjay Garg2 Privacy Preserving Data Mining Techniques: Challenges & Issues. Proceedings of International Conference on Computer Science & Information Technology, CSlT – 2011.
[30]. Mrs. P.Cynthia Selvi, Dr. A.R.Mohamed Shanavas An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 5, Issue 1 (Sep-Oct. 2012), PP 06-11