{"title":"基于数据干扰和查询限制的隐私保护关联规则挖掘","authors":"Wei Li, Jie Liu","doi":"10.1109/ICICSE.2009.30","DOIUrl":null,"url":null,"abstract":"Privacy is an important issue in data mining and knowledge discovery. In this paper, we use the randomized response technology to conduct association rule mining. We propose a privacy preserving association rule mining algorithm which is called DDIL based on data disturbance and inquiry limitation. Applying DDIL on the data set, the original data can be disturbed and hidden and the degree of privacy-preserving is improved effectively. Specially, a high effective method of generating frequent items from transformed data sets is proposed. Our experiments demonstrate that when the random parameters are chosen suitably, our methods are effective and provide acceptable values in practice for balancing privacy and accuracy.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"633 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Privacy Preserving Association Rules Mining Based on Data Disturbance and Inquiry Limitation\",\"authors\":\"Wei Li, Jie Liu\",\"doi\":\"10.1109/ICICSE.2009.30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Privacy is an important issue in data mining and knowledge discovery. In this paper, we use the randomized response technology to conduct association rule mining. We propose a privacy preserving association rule mining algorithm which is called DDIL based on data disturbance and inquiry limitation. Applying DDIL on the data set, the original data can be disturbed and hidden and the degree of privacy-preserving is improved effectively. Specially, a high effective method of generating frequent items from transformed data sets is proposed. Our experiments demonstrate that when the random parameters are chosen suitably, our methods are effective and provide acceptable values in practice for balancing privacy and accuracy.\",\"PeriodicalId\":193621,\"journal\":{\"name\":\"2009 Fourth International Conference on Internet Computing for Science and Engineering\",\"volume\":\"633 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fourth International Conference on Internet Computing for Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICSE.2009.30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Internet Computing for Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICSE.2009.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy Preserving Association Rules Mining Based on Data Disturbance and Inquiry Limitation
Privacy is an important issue in data mining and knowledge discovery. In this paper, we use the randomized response technology to conduct association rule mining. We propose a privacy preserving association rule mining algorithm which is called DDIL based on data disturbance and inquiry limitation. Applying DDIL on the data set, the original data can be disturbed and hidden and the degree of privacy-preserving is improved effectively. Specially, a high effective method of generating frequent items from transformed data sets is proposed. Our experiments demonstrate that when the random parameters are chosen suitably, our methods are effective and provide acceptable values in practice for balancing privacy and accuracy.