Privacy Preserving Big Data Mining: Association Rule Hiding

Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 2

Abstract

Data repositories contain sensitive information which must be protected from unauthorized access. Existing data mining techniques can be considered as a privacy threat to sensitive data. Association rule mining is one of the utmost data mining techniques which tries to cover relationships between seemingly unrelated data in a data base.. Association rule hiding is a research area in privacy preserving data mining (PPDM) which addresses a solution for hiding sensitive rules within the data problem. Many researches have be done in this area, but most of them focus on reducing undesired side effect of deleting sensitive association rules in static databases. However, in the age of big data, we confront with dynamic data bases with new data entrance at any time. So, most of existing techniques would not be practical and must be updated in order to be appropriate for these huge volume data bases. In this paper, data anonymization technique is used for association rule hiding, while parallelization and scalability features are also embedded in the proposed model, in order to speed up big data mining process. In this way, instead of removing some instances of an existing important association rule, generalization is used to anonymize items in appropriate level. So, if necessary, we can update important association rules based on the new data entrances. We have conducted some experiments using three datasets in order to evaluate performance of the proposed model in comparison with Max-Min2 and HSCRIL. Experimental results show that the information loss of the proposed model is less than existing researches in this area and this model can be executed in a parallel manner for less execution time

Authors and Affiliations

Golnar Assadat Afzali, Shahriar Mohammadi

Keywords

Related Articles

A Robust Data Envelopment Analysis Method for Business and IT Alignment of Enterprise Architecture Scenarios

Information Technology is recognized as a competitive enabler in today’s dynamic business environment. Therefore, alliance of business and Information Technology process is critical, which is mostly emphasized in Informa...

Simultaneous Methods of Image Registration and Super-Resolution Using Analytical Combinational Jacobian Matrix

In this paper we propose two new simultaneous image registration (IR) and super-resolution (SR) methods using a novel approach to calculate the Jacobian matrix. SR is the process of fusing several low resolution (LR) ima...

A Stochastic Lyapunov Theorem with Application to Stability Analysis of Networked Control Systems

The source of randomness in stochastic systems is an input with stochastic behavior as treated in the existing literature. Special types of stochastic processes such as the Wiener process or the Brownian motion have serv...

A Wideband Low-Noise Downconversion Mixerwith Positive-Negative Feedbacks

This paper presents a wideband low-noise mixer in CMOS 0.13-um technology that operates between 2–10.5 GHz. The mixer has a Gilbert cell configuration that employs broadband low-noise trans conductors designed using the...

BER Performance Analysis of MIMO-OFDM Communication Systems Using Iterative Technique Over Indoor Power Line Channels in an Impulsive Noise Environment

This paper addresses the performance of MIMO-OFDM communication system in environments where the interfering noise exhibits non-Gaussian behavior due to impulsive phenomena. It presents the design and simulation of an it...

Download PDF file
  • EP ID EP184430
  • DOI 10.7508/jist.2016.02.001
  • Views 122
  • Downloads 0

How To Cite

Golnar Assadat Afzali, Shahriar Mohammadi (2016). Privacy Preserving Big Data Mining: Association Rule Hiding. Journal of Information Systems and Telecommunication, 4(2), 70-77. https://europub.co.uk/articles/-A-184430