Have a personal or library account? Click to login
Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database Cover

Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database

By: P. Gayathiri and  B. Poorna  
Open Access
|Oct 2017

References

  1. 1. Lin, C.-W., B. Zhang, K.-T. Yang, T.-P. Hong. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms. – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, September 2014, Article ID 398269, pp. 1-13.
  2. 2. Tassa, T. Secure Mining of Association Rules in Horizontally Distributed Databases. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, April 2014, Issue 4, pp. 970-983.10.1109/TKDE.2013.41
  3. 3. Cheng, P., J.-S. Pan. Use EMO to Protect Sensitive Knowledge in Association Rule Mining by Adding Items. – ACM, July 2014, pp. 65-66.10.1145/2598394.2598465
  4. 4. Cheng, P., J.-S. Pan. Completely Hide Sensitive Association Rules Using EMO by Deleting Transactions. – ACM, July 2014, pp. 167-168.10.1145/2598394.2598466
  5. 5. Cheng, P., C.-W. Lin, J.-S. Pan. Use HypE to Hide Association Rules by Adding Items. – PLOS ONE | DOI:10.1371/journal.pone.0127834, Vol. 10, 12 June 2015, Issue 6, pp. 1-19.10.1371/journal.pone.0127834Vol.1012June2015Issue6pp.1-19
  6. 6. Lin, C.-W., T.-P. Hong, H.-C. H s u. Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining. – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 2014, Article ID 235837, pp. 1-12.
  7. 7. Lin, C.-W., T.-P. Hong, J.-W. Wong, G.-C. Lan, W.-Y. Lin. A GA-Based Approach to Hide Sensitive High Utility Itemsets – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 2014, Article ID 804629, pp. 1-12.
  8. 8. Sun, C., Y. Fu, J. Zhou, H. Gao. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response. – Hindawi Publishing Corporation, The Scientific World Journal Vol. 2014, 2014, Article ID 686151, pp. 1-10.
  9. 9. Sheykhinezhad, Z., M. Naderidehkordi, H. Rastegari. A Method for Hiding Association Rules with Minimum Changes in Database – ACSIJ Advances in Computer Science: An International Journal, Vol. 3, September 2014, Issue 5, pp. 83-90.
  10. 10. Rao, K. S., N. M. Venkata, B. Debnath. An Association Rule Hiding Algorithm for Privacy Preserving Data Mining. – International Journal of Control and Automation, Vol. 7, 2014, Issue 10, pp. 393-404.10.14257/ijca.2014.7.10.36
  11. 11. Shah1, R. A., S. Asghar. Privacy Preserving in Association Rules Using a Genetic Algorithm. – Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 22, February 2014, pp. 434-450.10.3906/elk-1206-66
  12. 12. Janakiramaiah, B., A. R. M. Reddy. Privacy Preserving Association Rule Mining by Concept of Impact Factor Using Item Lattice. – Wseas Transactions on Computers, Vol. 13, June 2014, pp. 567-581.
  13. 13. Li, Y., M. Chen, Q. Li, W. Zhang. Enabling Multilevel Trust in Privacy Preserving Data Mining. – IEEE Transactions on Knowledge and Data Engineering, Vol. 24, September 2012, Issue 9, pp. 1598-1612.10.1109/TKDE.2011.124
  14. 14. Li, T., N. Li, J. Zhang, I. Molloy. Slicing: A New Approach to Privacy Preserving Data Publishing. – IEEE Transactions on Knowledge and Data Engineering, Vol. 24, March 2012, Issue 3, pp. 561-574.10.1109/TKDE.2010.236
  15. 15. Paulet, R., M. G. Kaosar, X. Yi, E. Bertino. Privacy-Preserving and Content-Protecting Location Based Queries. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, May 2014, Issue 5, pp. 1200-1210.10.1109/TKDE.2013.87
  16. 16. Pervaiz, Z., W. G. Aref, A. Ghafoor, N. Prabhu. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, April 2014, Issue 4, pp. 795-807.10.1109/TKDE.2013.71
  17. 17. Goryczka, S., X. Li, B. C. M. Fung. m-Privacy for Collaborative Data Publishing. – IEEE Transactions of Knowledge and Data Engineering, Vol. 26, October 2014, Issue 10, pp. 2520-2533.10.1109/TKDE.2013.18
  18. 18. Nabeel, M., E. Bertino. Privacy Preserving Delegated Access Control in Public Clouds. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, September 2014, Issue 9, pp. 2268-2280.10.1109/TKDE.2013.68
  19. 19. Nabeel, M., E. Bertino. Privacy-Preserving Fine-Grained Access Control in Public Clouds. – IEEE Computer Society Technical Committee on Data Engineering, 2012, pp. 21-30.
  20. 20. Bonchi, F., C. Castillo, D. Donato, A. Gionis. Taxonomy-Driven Lumping for Sequence Mining. – Data Mining and Knowledge Discovery, Vol. 19, October 2009, Issue 2, Springer, pp. 227-244.10.1007/s10618-009-0141-6
  21. 21. Amer-Yahia, S., F. Bonchi, C. Castillo, E. Feuerstein, I. Mendez-Diaz, P. Zabala. Composite Retrieval of Diverse and Complementary Bundles. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, November 2014, Issue 11, pp. 2662-2675.10.1109/TKDE.2014.2306678
  22. 22. Priyadarsini, R. P., M. L. Valarmathi, S. Sivakumari. Attribute Association Based Privacy Preservation for Multi Trust Level Environment. – Indian Academy of Science, Vol. 40, September 2015, Issue 6, Springer, pp. 1769-1792.10.1007/s12046-015-0412-4
DOI: https://doi.org/10.1515/cait-2017-0032 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 92 - 108
Published on: Oct 4, 2017
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2017 P. Gayathiri, B. Poorna, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.