Association rule hiding
Top Cited Papers
- 3 March 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Knowledge and Data Engineering
- Vol. 16 (4) , 434-447
- https://doi.org/10.1109/tkde.2004.1269668
Abstract
Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security research community and for the government statistical agencies. Recent advances in data mining and machine learning algorithms have increased the disclosure risks that one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. We investigate confidentiality issues of a broad category of rules, the association rules. In particular, we present three strategies and five algorithms for hiding a group of association rules, which is characterized as sensitive. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. We also perform an evaluation study of the hiding algorithms in order to analyze their time complexity and the impact that they have in the original database.Keywords
This publication has 6 references indexed in Scilit:
- Disclosure limitation of sensitive rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On the design and quantification of privacy preserving data mining algorithmsPublished by Association for Computing Machinery (ACM) ,2001
- Privacy-preserving data miningPublished by Association for Computing Machinery (ACM) ,2000
- Inference in MLS database systemsIEEE Transactions on Knowledge and Data Engineering, 1996
- Security constraint processing in a multilevel secure distributed database management systemIEEE Transactions on Knowledge and Data Engineering, 1995
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989