作者
Chieh-Ming Wu, Yin-Fu Huang, Jian-Ying Chen
发表日期
2009/3/31
研讨会论文
2009 WRI World Congress on Computer Science and Information Engineering
卷号
4
页码范围
61-65
出版商
IEEE
简介
Data mining techniques have been developed in many applications. However, they also cause a threat to privacy. In this paper, we proposed a greedy method for hiding the number of sensitive rules. The experimental results showed that the undesired side effects can be avoided in the rule hiding process by use of our approach. The results also revealed that in most cases, all the sensitive rules are hidden without generating spurious rules. First, the good scalability of our approach in terms of database sizes is achieved by using an efficient data structure FCET to store solely maximal frequent itemsets rather than the entire frequent itemsets. Furthermore, we proposed a new framework for enforcing the privacy in mining association rules, that combine the techniques for efficiently hiding sensitive rules and the transaction retrieval engine based on the FCET index tree. In particular, four strategies are implemented in …
引用总数
2011201220132014201520162017201820192020202120222023531111
学术搜索中的文章
CM Wu, YF Huang, JY Chen - 2009 WRI World Congress on Computer Science and …, 2009