Skip to main content
Erschienen in: Cluster Computing 2/2024

11.05.2023

Secure itemset hiding in smart city sensor data

verfasst von: Gautam Srivastava, Jerry Chun-Wei Lin, Guo Lin

Erschienen in: Cluster Computing | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sensor data that is often collected in the Internet of Things (IoT) or any smart city environment should be protected against security and privacy concerns. Often, sensor data that is shared by devices in smart cities contains sensitive or private information that can often be shared over different networks and by different smart applications. In the last decade, the area of Privacy-Preserving Data Mining (PPDM) has received a lot of attention as the amount of data received and collected daily is huge. Unfortunately, PPDM mostly applies to binary data. To improve the usefulness of PPDM, we present a more usable version for smart cities called Privacy-Preserving Utility Mining (PPUM), in the form of a Maximal Sensitive Utility-Maximal Sensitive ConflIct (MSU-MSI) algorithm. MSU-MSI finds any conflicting items that may contain sensitive itemsets with high-utility and sanitizes them, stripping them of sensitive and private information while maintaining utility. Any transactions encountered that contain sensitive itemsets are first fed through sanitization processes. This is followed by calculating the total number of items that conflict, and then removing them so sanitization processes can operate more efficiently so as to not redo known sanitization processes. We conduct an in-depth experimental analysis, where our detailed methodology is compared directly with state-of-the-art frameworks such as MSU-MIU, MSU-MAU, HHUIF and MSCIF. Our proposed MSU-MSI shows a higher performance in missing cost, in particular when dealing with highly dense or highly sparse datasets. Moreover, our novel framework is shown to achieve an excellent performance with regards to similarity in database structure and database utility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: The International Conference on Very Large Data Bases, vol. 1215, pp. 487–499 (1994) Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: The International Conference on Very Large Data Bases, vol. 1215, pp. 487–499 (1994)
2.
Zurück zum Zitat Alawneh, L., Shehab, M.A., Al-Ayyoub, M., Jararweh, Y., Al-Sharif, Z.A.: A scalable multiple pairwise protein sequence alignment acceleration using hybrid CPU-GPU approach. Clust. Comput. 23, 2677–2688 (2020)CrossRef Alawneh, L., Shehab, M.A., Al-Ayyoub, M., Jararweh, Y., Al-Sharif, Z.A.: A scalable multiple pairwise protein sequence alignment acceleration using hybrid CPU-GPU approach. Clust. Comput. 23, 2677–2688 (2020)CrossRef
3.
Zurück zum Zitat Amiri, A.: Dare to share: protecting sensitive knowledge with data sanitization. Decis. Support Syst. 43(1), 181–191 (2007)CrossRef Amiri, A.: Dare to share: protecting sensitive knowledge with data sanitization. Decis. Support Syst. 43(1), 181–191 (2007)CrossRef
4.
Zurück zum Zitat Bertino, E., Fovino, I.N., Provenza, L.P.: A framework for evaluating privacy preserving data mining algorithms. Data Min. Knowl. Disc. 11(2), 121–154 (2005)MathSciNetCrossRef Bertino, E., Fovino, I.N., Provenza, L.P.: A framework for evaluating privacy preserving data mining algorithms. Data Min. Knowl. Disc. 11(2), 121–154 (2005)MathSciNetCrossRef
5.
Zurück zum Zitat Cai, H., Xu, B., Jiang, L., Vasilakos, A.V.: Iot-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J. 4(1), 75–87 (2016)CrossRef Cai, H., Xu, B., Jiang, L., Vasilakos, A.V.: Iot-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J. 4(1), 75–87 (2016)CrossRef
6.
Zurück zum Zitat Chan, R., Yang, Q., Shen, Y.D.: Mining high utility itemsets. In: Third IEEE International Conference on Data Mining, pp. 19–26 (2003) Chan, R., Yang, Q., Shen, Y.D.: Mining high utility itemsets. In: Third IEEE International Conference on Data Mining, pp. 19–26 (2003)
7.
Zurück zum Zitat Chen, M.S., Han, J., Yu, P.S.: Data mining: an overview from a database perspective. IEEE Trans. Knowl. Data Eng. 8(6), 866–883 (1996)CrossRef Chen, M.S., Han, J., Yu, P.S.: Data mining: an overview from a database perspective. IEEE Trans. Knowl. Data Eng. 8(6), 866–883 (1996)CrossRef
8.
Zurück zum Zitat Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: International Workshop on Information Hiding, pp. 369–383 (2001) Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: International Workshop on Information Hiding, pp. 369–383 (2001)
9.
Zurück zum Zitat Duong, H., Truong, T., Vo, B.: An efficient method for mining frequent itemsets with double constraints. Eng. Appl. Artif. Intell. 27, 148–154 (2014)CrossRef Duong, H., Truong, T., Vo, B.: An efficient method for mining frequent itemsets with double constraints. Eng. Appl. Artif. Intell. 27, 148–154 (2014)CrossRef
10.
Zurück zum Zitat Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37–37 (1996) Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37–37 (1996)
11.
Zurück zum Zitat Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Tseng, V.S., Yu, P.S.: A survey of utility-oriented pattern mining. IEEE Trans. Knowl. Data Eng. 33, 1306–1327 (2019)CrossRef Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Tseng, V.S., Yu, P.S.: A survey of utility-oriented pattern mining. IEEE Trans. Knowl. Data Eng. 33, 1306–1327 (2019)CrossRef
12.
Zurück zum Zitat Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2012)CrossRef Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2012)CrossRef
13.
Zurück zum Zitat Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Disc. 8(1), 53–87 (2004)MathSciNetCrossRef Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Disc. 8(1), 53–87 (2004)MathSciNetCrossRef
14.
Zurück zum Zitat Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4), 502–510 (2013)CrossRef Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4), 502–510 (2013)CrossRef
15.
Zurück zum Zitat Hong, T.P., Wang, C.Y., Tao, Y.H.: A new incremental data mining algorithm using pre-large itemsets. Intell. Data Anal. 5(2), 111–129 (2001)CrossRef Hong, T.P., Wang, C.Y., Tao, Y.H.: A new incremental data mining algorithm using pre-large itemsets. Intell. Data Anal. 5(2), 111–129 (2001)CrossRef
16.
Zurück zum Zitat Jangra, S., Toshniwal, D.: Efficient algorithms for victim item selection in privacy-preserving utility mining. Futur. Gener. Comput. Syst. 128, 219–234 (2022)CrossRef Jangra, S., Toshniwal, D.: Efficient algorithms for victim item selection in privacy-preserving utility mining. Futur. Gener. Comput. Syst. 128, 219–234 (2022)CrossRef
17.
Zurück zum Zitat Krishnamoorthy, S.: A comparative study of top-k high utility itemset mining methods. In: High-Utility Pattern Mining, pp. 47–74 (2019) Krishnamoorthy, S.: A comparative study of top-k high utility itemset mining methods. In: High-Utility Pattern Mining, pp. 47–74 (2019)
18.
Zurück zum Zitat Li, S., Mu, N., Le, J., Liao, X.: A novel algorithm for privacy preserving utility mining based on integer linear programming. Eng. Appl. Artif. Intell. 81, 300–312 (2019)CrossRef Li, S., Mu, N., Le, J., Liao, X.: A novel algorithm for privacy preserving utility mining based on integer linear programming. Eng. Appl. Artif. Intell. 81, 300–312 (2019)CrossRef
19.
Zurück zum Zitat Li, X., Liu, S., Wu, F., Kumari, S., Rodrigues, J.J.P.C.: Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 6(3), 4755–4763 (2019)CrossRef Li, X., Liu, S., Wu, F., Kumari, S., Rodrigues, J.J.P.C.: Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 6(3), 4755–4763 (2019)CrossRef
20.
Zurück zum Zitat Li, X.B., Sarkar, S.: A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 18(9), 1278–1283 (2006)CrossRef Li, X.B., Sarkar, S.: A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 18(9), 1278–1283 (2006)CrossRef
21.
Zurück zum Zitat Li, Y.C., Yeh, J.S., Chang, C.C.: MICF: an effective sanitization algorithm for hiding sensitive patterns on data mining. Adv. Eng. Inform. 21(3), 269–280 (2007)CrossRef Li, Y.C., Yeh, J.S., Chang, C.C.: MICF: an effective sanitization algorithm for hiding sensitive patterns on data mining. Adv. Eng. Inform. 21(3), 269–280 (2007)CrossRef
22.
Zurück zum Zitat Lin, C.W., Hong, T.P., Wong, J.W., Lan, G.C., Lin, W.Y.: A GA-based approach to hide sensitive high utility itemsets. Sci. World J. 2014 (2014) Lin, C.W., Hong, T.P., Wong, J.W., Lan, G.C., Lin, W.Y.: A GA-based approach to hide sensitive high utility itemsets. Sci. World J. 2014 (2014)
23.
Zurück zum Zitat Lin, J.C.W., Fournier-Viger, P., Wu, L., Gan, W., Djenouri, Y., Zhang, J.: PPSF: An open-source privacy-preserving and security mining framework. In: IEEE International Conference on Data Mining Workshops, pp. 1459–1463 (2018) Lin, J.C.W., Fournier-Viger, P., Wu, L., Gan, W., Djenouri, Y., Zhang, J.: PPSF: An open-source privacy-preserving and security mining framework. In: IEEE International Conference on Data Mining Workshops, pp. 1459–1463 (2018)
24.
Zurück zum Zitat Lin, J.C.W., Liu, Q., Fournier-Viger, P., Hong, T.P., Voznak, M., Zhan, J.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1–18 (2016)CrossRef Lin, J.C.W., Liu, Q., Fournier-Viger, P., Hong, T.P., Voznak, M., Zhan, J.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1–18 (2016)CrossRef
25.
Zurück zum Zitat Lin, J.C.W., Wu, T.Y., Fournier-Viger, P., Lin, G., Zhan, J., Voznak, M.: Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. Artif. Intell. 55, 269–284 (2016)CrossRef Lin, J.C.W., Wu, T.Y., Fournier-Viger, P., Lin, G., Zhan, J., Voznak, M.: Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. Artif. Intell. 55, 269–284 (2016)CrossRef
26.
Zurück zum Zitat Lin, M.Y., Tu, T.F., Hsueh, S.C.: High utility pattern mining using the maximal itemset property and lexicographic tree structures. Inf. Sci. 215, 1–14 (2012)CrossRef Lin, M.Y., Tu, T.F., Hsueh, S.C.: High utility pattern mining using the maximal itemset property and lexicographic tree structures. Inf. Sci. 215, 1–14 (2012)CrossRef
27.
Zurück zum Zitat Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Annual International Cryptology Conference, pp. 36–54 (2000) Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Annual International Cryptology Conference, pp. 36–54 (2000)
28.
Zurück zum Zitat Liu, M., Qu, J.: Mining high utility itemsets without candidate generation. In: ACM International Conference on Information and Knowledge Management, pp. 55–64 (2012) Liu, M., Qu, J.: Mining high utility itemsets without candidate generation. In: ACM International Conference on Information and Knowledge Management, pp. 55–64 (2012)
29.
Zurück zum Zitat Liu, X., Chen, G., Wen, S., Song, G.: An improved sanitization algorithm in privacy-preserving utility mining. Math. Probl. Eng. 2020, 7489045 (2020) Liu, X., Chen, G., Wen, S., Song, G.: An improved sanitization algorithm in privacy-preserving utility mining. Math. Probl. Eng. 2020, 7489045 (2020)
30.
Zurück zum Zitat Liu, X., Wen, S., Zuo, W.: Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining. Appl. Intell. 50, 169–191 (2020)CrossRef Liu, X., Wen, S., Zuo, W.: Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining. Appl. Intell. 50, 169–191 (2020)CrossRef
31.
Zurück zum Zitat Liu, Y., Liao, W.K., Choudhary, A.: A two-phase algorithm for fast discovery of high utility itemsets. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 689–695 (2005) Liu, Y., Liao, W.K., Choudhary, A.: A two-phase algorithm for fast discovery of high utility itemsets. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 689–695 (2005)
32.
Zurück zum Zitat Makani, S., Pittala, R., Alsayed, E., Aloqaily, M., Jararweh, Y.: A survey of blockchain applications in sustainable and smart cities. Clust. Comput. 25(6), 3915–3936 (2022)CrossRef Makani, S., Pittala, R., Alsayed, E., Aloqaily, M., Jararweh, Y.: A survey of blockchain applications in sustainable and smart cities. Clust. Comput. 25(6), 3915–3936 (2022)CrossRef
33.
Zurück zum Zitat Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Hashem, I.A.T., Siddiqa, A., Yaqoob, I.: Big IoT data analytics: Architecture, opportunities, and open research challenges. IEEE Access 5, 5247–5261 (2017)CrossRef Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Hashem, I.A.T., Siddiqa, A., Yaqoob, I.: Big IoT data analytics: Architecture, opportunities, and open research challenges. IEEE Access 5, 5247–5261 (2017)CrossRef
34.
Zurück zum Zitat Sollins, K.R.: IoT big data security and privacy versus innovation. IEEE Internet Things J. 6(2), 1628–1635 (2019)CrossRef Sollins, K.R.: IoT big data security and privacy versus innovation. IEEE Internet Things J. 6(2), 1628–1635 (2019)CrossRef
35.
Zurück zum Zitat Sreenivasulu, A.L., Reddy, C.P.: NLDA non-linear regression model for preserving data privacy in wireless sensor networks. Digit. Commun. Netw. 6(1), 101–107 (2020)CrossRef Sreenivasulu, A.L., Reddy, C.P.: NLDA non-linear regression model for preserving data privacy in wireless sensor networks. Digit. Commun. Netw. 6(1), 101–107 (2020)CrossRef
36.
Zurück zum Zitat Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: IEEE International Conference on Data Mining, p. 8 (2005) Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: IEEE International Conference on Data Mining, p. 8 (2005)
37.
Zurück zum Zitat Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23, 2151–2165 (2020)CrossRef Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23, 2151–2165 (2020)CrossRef
38.
Zurück zum Zitat Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Trans. Knowl. Data Eng. 16(4), 434–447 (2004)CrossRef Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Trans. Knowl. Data Eng. 16(4), 434–447 (2004)CrossRef
39.
Zurück zum Zitat Wu, D., Yang, B., Wang, R.: Scalable privacy-preserving big data aggregation mechanism. Digit. Commun. Netw. 2(3), 122–129 (2016)CrossRef Wu, D., Yang, B., Wang, R.: Scalable privacy-preserving big data aggregation mechanism. Digit. Commun. Netw. 2(3), 122–129 (2016)CrossRef
40.
Zurück zum Zitat Wu, J.M.T., Zhan, J., Lin, J.C.W.: Ant colony system sanitization approach to hiding sensitive itemsets. IEEE Access 5, 10024–10039 (2017)CrossRef Wu, J.M.T., Zhan, J., Lin, J.C.W.: Ant colony system sanitization approach to hiding sensitive itemsets. IEEE Access 5, 10024–10039 (2017)CrossRef
41.
Zurück zum Zitat Yao, H., Hamilton, H.J.: Mining itemset utilities from transaction databases. Data Knowl. Eng. 59(3), 603–626 (2006)CrossRef Yao, H., Hamilton, H.J.: Mining itemset utilities from transaction databases. Data Knowl. Eng. 59(3), 603–626 (2006)CrossRef
42.
Zurück zum Zitat Yao, H., Hamilton, H.J., Butz, C.J.: A foundational approach to mining itemset utilities from databases. In: SIAM International Conference on Data Mining, pp. 482–486 (2004) Yao, H., Hamilton, H.J., Butz, C.J.: A foundational approach to mining itemset utilities from databases. In: SIAM International Conference on Data Mining, pp. 482–486 (2004)
43.
Zurück zum Zitat Yao, X., Farha, F., Li, R., Psychoula, I., Chen, L., Ning, H.: Security and privacy issues of physical objects in the IoT: challenges and opportunities. Digit. Commun. Netw. 7, 373–384 (2020)CrossRef Yao, X., Farha, F., Li, R., Psychoula, I., Chen, L., Ning, H.: Security and privacy issues of physical objects in the IoT: challenges and opportunities. Digit. Commun. Netw. 7, 373–384 (2020)CrossRef
44.
Zurück zum Zitat Yeh, J.S., Hsu, P.C.: HHUIF and MSICF: novel algorithms for privacy preserving utility mining. Expert Syst. Appl. 37(7), 4779–4786 (2010)CrossRef Yeh, J.S., Hsu, P.C.: HHUIF and MSICF: novel algorithms for privacy preserving utility mining. Expert Syst. Appl. 37(7), 4779–4786 (2010)CrossRef
45.
Zurück zum Zitat Yun, U., Kim, J.: A fast perturbation algorithm using tree structure for privacy preserving utility mining. Expert Syst. Appl. 42(3), 1149–1165 (2015)CrossRef Yun, U., Kim, J.: A fast perturbation algorithm using tree structure for privacy preserving utility mining. Expert Syst. Appl. 42(3), 1149–1165 (2015)CrossRef
Metadaten
Titel
Secure itemset hiding in smart city sensor data
verfasst von
Gautam Srivastava
Jerry Chun-Wei Lin
Guo Lin
Publikationsdatum
11.05.2023
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2024
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-023-04000-2

Weitere Artikel der Ausgabe 2/2024

Cluster Computing 2/2024 Zur Ausgabe

Premium Partner