{"title":"Privacy Preserving Association Rules Mining Based on Data Disturbance and Inquiry Limitation","authors":"Wei Li, Jie Liu","doi":"10.1109/ICICSE.2009.30","DOIUrl":null,"url":null,"abstract":"Privacy is an important issue in data mining and knowledge discovery. In this paper, we use the randomized response technology to conduct association rule mining. We propose a privacy preserving association rule mining algorithm which is called DDIL based on data disturbance and inquiry limitation. Applying DDIL on the data set, the original data can be disturbed and hidden and the degree of privacy-preserving is improved effectively. Specially, a high effective method of generating frequent items from transformed data sets is proposed. Our experiments demonstrate that when the random parameters are chosen suitably, our methods are effective and provide acceptable values in practice for balancing privacy and accuracy.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"633 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Internet Computing for Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICSE.2009.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Privacy is an important issue in data mining and knowledge discovery. In this paper, we use the randomized response technology to conduct association rule mining. We propose a privacy preserving association rule mining algorithm which is called DDIL based on data disturbance and inquiry limitation. Applying DDIL on the data set, the original data can be disturbed and hidden and the degree of privacy-preserving is improved effectively. Specially, a high effective method of generating frequent items from transformed data sets is proposed. Our experiments demonstrate that when the random parameters are chosen suitably, our methods are effective and provide acceptable values in practice for balancing privacy and accuracy.