Skip to main content

2017 | OriginalPaper | Buchkapitel

Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration

verfasst von : G. Kalyani, M. V. P. Chandra Sekhara Rao, B. Janakiramaiah

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sharing of data provides mutual benefits for collaborating organizations. Data mining techniques have allowed regimented discovery of knowledge from huge databases. Conversely, in the case of sharing the data with others, knowledge discovery raises the possibility of revealing the sensitive knowledge. The need of privacy prompted the growth of numerous privacy-preserving data mining techniques. In order to deal with privacy concerns, the database is to be transformed into another database in such a way that the sensitive knowledge is concealed. One subarea of privacy-preserving data mining, which got attention in retail businesses, is privacy-preserving association rule mining. A significant feature of privacy-preserving association rule mining is attaining a balance between privacy and precision, which is characteristically conflicting, and refining the one generally reduces the other one. In this paper, the problem has been planned in the perspective of protecting association rules which are sensitive by prudently amending the transactions of the database. To moderate the loss of non-sensitive association rules and to improve the quality of the transformed database, the proposed approach competently estimates the impact of an alteration to the database. The proposed method selects the transactions for alterations using the binary TLBO optimization technique during the concealing process. Experimental outcomes exhibit the efficiency of the proposed algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Amiri. Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems, 2007. A. Amiri. Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems, 2007.
2.
Zurück zum Zitat M.V.P. Chandra Sekhar Rao. Ch Aparna. Dr B Raveendra Babu. Dr A Damodaram. An improved multi-perceptron neural network model to classify software defects. International Journal on Computer Science and Information Security (IJCSIS), 2011. M.V.P. Chandra Sekhar Rao. Ch Aparna. Dr B Raveendra Babu. Dr A Damodaram. An improved multi-perceptron neural network model to classify software defects. International Journal on Computer Science and Information Security (IJCSIS), 2011.
3.
Zurück zum Zitat V S Verkios. E Bertino. L P Provenza. Y Saygin. E. Dasseni. Association rule hiding. IEEE Transactions on on Knowledge and Data Engineering, 2004. V S Verkios. E Bertino. L P Provenza. Y Saygin. E. Dasseni. Association rule hiding. IEEE Transactions on on Knowledge and Data Engineering, 2004.
4.
Zurück zum Zitat Agrawal R Gehrke. J Evfimievski. A, Srikant.R. Privacy preserving mining of association rules. In: Proceedings of SIGKDD Conference, 2002. Agrawal R Gehrke. J Evfimievski. A, Srikant.R. Privacy preserving mining of association rules. In: Proceedings of SIGKDD Conference, 2002.
5.
Zurück zum Zitat Yang Kuo-Tung Wang Shyue-Liang Hong Tzung-Pei, Lin Chun-Wei. Using tf-idf to hide sensitive itemsets. Applied Intelligence, 2013. Yang Kuo-Tung Wang Shyue-Liang Hong Tzung-Pei, Lin Chun-Wei. Using tf-idf to hide sensitive itemsets. Applied Intelligence, 2013.
6.
Zurück zum Zitat Le Hai Quoc. Arch int Sojit. Nguyen Huy Xuan. Association rule hiding in risk management for retail supply chain collaboration. Computer in Industry, 2013. Le Hai Quoc. Arch int Sojit. Nguyen Huy Xuan. Association rule hiding in risk management for retail supply chain collaboration. Computer in Industry, 2013.
7.
Zurück zum Zitat J Bonam. A R Reddy. G Kalyani. Privacy preserving in association rule mining by data distortion using pso. Proc, ICT Critical Infrastruct., 2014. J Bonam. A R Reddy. G Kalyani. Privacy preserving in association rule mining by data distortion using pso. Proc, ICT Critical Infrastruct., 2014.
8.
Zurück zum Zitat R Venkata Rao. Review of applications of tlbo algorithm and a tutorial for beginners to solve the unconstrained and constrained optimization problems. Decision Science Letters, GrowingScience, 2016. R Venkata Rao. Review of applications of tlbo algorithm and a tutorial for beginners to solve the unconstrained and constrained optimization problems. Decision Science Letters, GrowingScience, 2016.
9.
Zurück zum Zitat R V Rao. V J Savsani. Teacher learning-basd optimization: a novel method for constrained mechanical design opttimization problems. Comput. Aided Des., 2011. R V Rao. V J Savsani. Teacher learning-basd optimization: a novel method for constrained mechanical design opttimization problems. Comput. Aided Des., 2011.
10.
Zurück zum Zitat Xun Yi, Fang-Yu Rao, Elisa Bertino, and Athman Bouguettaya. Privacy-preserving association rule mining in cloud computing. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security., 2015. Xun Yi, Fang-Yu Rao, Elisa Bertino, and Athman Bouguettaya. Privacy-preserving association rule mining in cloud computing. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security., 2015.
Metadaten
Titel
Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration
verfasst von
G. Kalyani
M. V. P. Chandra Sekhara Rao
B. Janakiramaiah
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_19

Premium Partner