...
首页> 外文期刊>Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies >Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining
【24h】

Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining

机译:保护高实用题挖掘敏感知识的有效待遇方法

获取原文
获取原文并翻译 | 示例
           

摘要

For mutual benefit, data is shared among business organizations. However, this may result in privacy and security threats. To address this issue, privacy-preserving data mining is presented to sanitize the original database to hide all sensitive knowledge. Privacy-preserving utility mining is an extension of privacy-preserving data mining, the objective of which is to hide all sensitive high-utility itemsets and minimize the side effects on non-sensitive knowledge caused by the sanitization process. In this paper, three heuristic algorithms for privacy-preserving utility mining are proposed, namely, Selecting Maximum Utility item first (SMAU), Selecting Minimum Utility item first (SMIU) and Selecting Minimum Side Effects item first (SMSE). The quality of the database is well maintained because all of the proposed algorithms consider the side effects on the non-sensitive itemsets. Furthermore, to avoid performing multiple database scans, two table structures, T-table and HUI-table, are adopted to accelerate the hiding process by only scanning the database twice. The experimental results show that the proposed approaches successfully conceal all sensitive itemsets with fewer distortions of non-sensitive knowledge. Moreover, the influence of the database density on the proposed approaches is observed.
机译:为了互惠互利,数据在商业组织之间共享。但是,这可能导致隐私和安全威胁。要解决此问题,提出了隐私保留数据挖掘以消毒原始数据库以隐藏所有敏感知识。隐私保存的公用事业挖掘是一个隐私保留数据挖掘的延伸,其目的是隐藏所有敏感的高实用项目集,并最大限度地减少对消毒过程引起的非敏感知识的副作用。在本文中,提出了三种隐私保护实用程序挖掘的启发式算法,即选择最大公用事业项目第一(SMAU),选择最小实用程序项目第一(SMIU)并选择最小副作用项目(SMSE)。数据库的质量保持良好,因为所有提议的算法都考虑了对非敏感项集的副作用。此外,为了避免执行多个数据库扫描,采用两个表结构,T-table和Hui-tab到仅通过仅扫描数据库来加速隐藏过程。实验结果表明,该提出的方法成功地隐藏了所有敏感的项目,具有较少的非敏感知识的扭曲。此外,观察到数据库密度对所提出方法的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号