Open Access

Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database


Cite

1. Lin, C.-W., B. Zhang, K.-T. Yang, T.-P. Hong. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms. – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, September 2014, Article ID 398269, pp. 1-13.Search in Google Scholar

2. Tassa, T. Secure Mining of Association Rules in Horizontally Distributed Databases. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, April 2014, Issue 4, pp. 970-983.10.1109/TKDE.2013.41Search in Google Scholar

3. Cheng, P., J.-S. Pan. Use EMO to Protect Sensitive Knowledge in Association Rule Mining by Adding Items. – ACM, July 2014, pp. 65-66.10.1145/2598394.2598465Search in Google Scholar

4. Cheng, P., J.-S. Pan. Completely Hide Sensitive Association Rules Using EMO by Deleting Transactions. – ACM, July 2014, pp. 167-168.10.1145/2598394.2598466Search in Google Scholar

5. Cheng, P., C.-W. Lin, J.-S. Pan. Use HypE to Hide Association Rules by Adding Items. – PLOS ONE | DOI:10.1371/journal.pone.0127834, Vol. 10, 12 June 2015, Issue 6, pp. 1-19.10.1371/journal.pone.0127834Vol.1012June2015Issue6pp.1-19Open DOISearch in Google Scholar

6. Lin, C.-W., T.-P. Hong, H.-C. H s u. Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining. – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 2014, Article ID 235837, pp. 1-12.Search in Google Scholar

7. Lin, C.-W., T.-P. Hong, J.-W. Wong, G.-C. Lan, W.-Y. Lin. A GA-Based Approach to Hide Sensitive High Utility Itemsets – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 2014, Article ID 804629, pp. 1-12.Search in Google Scholar

8. Sun, C., Y. Fu, J. Zhou, H. Gao. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response. – Hindawi Publishing Corporation, The Scientific World Journal Vol. 2014, 2014, Article ID 686151, pp. 1-10.Search in Google Scholar

9. Sheykhinezhad, Z., M. Naderidehkordi, H. Rastegari. A Method for Hiding Association Rules with Minimum Changes in Database – ACSIJ Advances in Computer Science: An International Journal, Vol. 3, September 2014, Issue 5, pp. 83-90.Search in Google Scholar

10. Rao, K. S., N. M. Venkata, B. Debnath. An Association Rule Hiding Algorithm for Privacy Preserving Data Mining. – International Journal of Control and Automation, Vol. 7, 2014, Issue 10, pp. 393-404.10.14257/ijca.2014.7.10.36Search in Google Scholar

11. Shah1, R. A., S. Asghar. Privacy Preserving in Association Rules Using a Genetic Algorithm. – Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 22, February 2014, pp. 434-450.10.3906/elk-1206-66Search in Google Scholar

12. Janakiramaiah, B., A. R. M. Reddy. Privacy Preserving Association Rule Mining by Concept of Impact Factor Using Item Lattice. – Wseas Transactions on Computers, Vol. 13, June 2014, pp. 567-581.Search in Google Scholar

13. Li, Y., M. Chen, Q. Li, W. Zhang. Enabling Multilevel Trust in Privacy Preserving Data Mining. – IEEE Transactions on Knowledge and Data Engineering, Vol. 24, September 2012, Issue 9, pp. 1598-1612.10.1109/TKDE.2011.124Search in Google Scholar

14. Li, T., N. Li, J. Zhang, I. Molloy. Slicing: A New Approach to Privacy Preserving Data Publishing. – IEEE Transactions on Knowledge and Data Engineering, Vol. 24, March 2012, Issue 3, pp. 561-574.10.1109/TKDE.2010.236Search in Google Scholar

15. Paulet, R., M. G. Kaosar, X. Yi, E. Bertino. Privacy-Preserving and Content-Protecting Location Based Queries. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, May 2014, Issue 5, pp. 1200-1210.10.1109/TKDE.2013.87Search in Google Scholar

16. Pervaiz, Z., W. G. Aref, A. Ghafoor, N. Prabhu. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, April 2014, Issue 4, pp. 795-807.10.1109/TKDE.2013.71Search in Google Scholar

17. Goryczka, S., X. Li, B. C. M. Fung. m-Privacy for Collaborative Data Publishing. – IEEE Transactions of Knowledge and Data Engineering, Vol. 26, October 2014, Issue 10, pp. 2520-2533.10.1109/TKDE.2013.18Search in Google Scholar

18. Nabeel, M., E. Bertino. Privacy Preserving Delegated Access Control in Public Clouds. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, September 2014, Issue 9, pp. 2268-2280.10.1109/TKDE.2013.68Search in Google Scholar

19. Nabeel, M., E. Bertino. Privacy-Preserving Fine-Grained Access Control in Public Clouds. – IEEE Computer Society Technical Committee on Data Engineering, 2012, pp. 21-30.Search in Google Scholar

20. Bonchi, F., C. Castillo, D. Donato, A. Gionis. Taxonomy-Driven Lumping for Sequence Mining. – Data Mining and Knowledge Discovery, Vol. 19, October 2009, Issue 2, Springer, pp. 227-244.10.1007/s10618-009-0141-6Open DOISearch in Google Scholar

21. Amer-Yahia, S., F. Bonchi, C. Castillo, E. Feuerstein, I. Mendez-Diaz, P. Zabala. Composite Retrieval of Diverse and Complementary Bundles. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, November 2014, Issue 11, pp. 2662-2675.10.1109/TKDE.2014.2306678Open DOISearch in Google Scholar

22. Priyadarsini, R. P., M. L. Valarmathi, S. Sivakumari. Attribute Association Based Privacy Preservation for Multi Trust Level Environment. – Indian Academy of Science, Vol. 40, September 2015, Issue 6, Springer, pp. 1769-1792.10.1007/s12046-015-0412-4Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology