Sensitive association rules hiding using electromagnetic field optimization algorithm

Abstract Privacy preserving data mining has been a major research subject in recent years. The most important goal of this area is to protect personal information and prevent disclosure of this information during the data mining process. There are various techniques in the field of privacy preserving data mining. One of these techniques is association rules mining. The main purpose of association rules mining is to hide sensitive association rules. So far, various algorithms have been presented to this field in order to reach the purpose of sensitive association rules hiding. Each algorithm has its own specific functions and methods. To hide sensitive association rules, this paper presents an electromagnetic field optimization algorithm (EFO4ARH). This algorithm utilizes the data distortion technique to hide the sensitive association rules. In this algorithm, two fitness functions are used to reach the solution with the least side effects. Also, in this algorithm, the runtime has been reduced. This algorithm consists of a technique for exiting from local optima point and moving toward global optimal points. The performance of the proposed algorithm is evaluated by doing experiments on both real-world and synthetic datasets. Compared to four reference algorithms, the proposed algorithm shows a reduction in the side effects and better preservation of data quality. The performance of EFO4ARH is tested by standard deviation and mean Friedman ranks of error for standard functions (CEC benchmarks). In addition, hiding experiments show that our proposed algorithm outperforms existing hiding algorithms.

[1]  Aris Gkoulalas-Divanis,et al.  A Survey of Association Rule Hiding Methods for Privacy , 2008, Privacy-Preserving Data Mining.

[2]  Michael J. A. Berry,et al.  Data mining techniques - for marketing, sales, and customer support , 1997, Wiley computer publishing.

[3]  Hossein Nouri,et al.  A bacteria foraging algorithm based cell formation considering operation time , 2012 .

[4]  Ayyaz Hussain,et al.  Improved Genetic Algorithm Approach for Sensitive Association Rules Hiding , 2014 .

[5]  Francisco Herrera,et al.  A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms , 2011, Swarm Evol. Comput..

[6]  Shuicheng Yan,et al.  Correntropy based feature selection using binary projection , 2011, Pattern Recognit..

[7]  Mahmoudi Shadi,et al.  Binary Cuckoo Optimization Algorithm , 2013 .

[8]  Mohammad Naderi Dehkordi,et al.  Association rule hiding using cuckoo optimization algorithm , 2016, Expert Syst. Appl..

[9]  Asadollah Shahbahrami,et al.  Data sanitization in association rule mining: An analytical review , 2018, Expert Syst. Appl..

[10]  Ahmad Khademzadeh,et al.  A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms , 2009, J. Softw..

[11]  Justin Zhijun Zhan,et al.  Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining , 2016, Eng. Appl. Artif. Intell..

[12]  Hossein Nezamabadi-pour,et al.  BGSA: binary gravitational search algorithm , 2010, Natural Computing.

[13]  Russell C. Eberhart,et al.  A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[14]  Somjit Arch-int,et al.  Association rule hiding in risk management for retail supply chain collaboration , 2013, Comput. Ind..

[15]  Stanley Robson de Medeiros Oliveira,et al.  Privacy preserving frequent itemset mining , 2002 .

[16]  Elisa Bertino,et al.  Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.

[17]  Shengyao Wang,et al.  A novel binary fruit fly optimization algorithm for solving the multidimensional knapsack problem , 2013, Knowl. Based Syst..

[18]  Muhammad Khurram Khan,et al.  Binary Artificial Bee Colony optimization using bitwise operation , 2014, Comput. Ind. Eng..

[19]  Shyue-Liang Wang,et al.  Hiding informative association rule sets , 2007, Expert Syst. Appl..

[20]  Philip S. Yu,et al.  A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.

[21]  Dayang N. A. Jawawi,et al.  Electromagnetic field optimization: A physics-inspired metaheuristic optimization algorithm , 2016, Swarm Evol. Comput..

[22]  Sebastián Ventura,et al.  Educational data mining: A survey from 1995 to 2005 , 2007, Expert Syst. Appl..

[23]  Vassilios S. Verykios,et al.  Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).

[24]  Brijesh Kumar Chaurasia,et al.  Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s) , 2012 .

[25]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .