A Survey on Association Rule Hiding Methods

In recent years, the use of data mining techniques and related applications has increased a lot as it is used to extract important knowledge from large amount of data. This has increased the disclosure risks to sensitive information when the data is released to outside parties. Database containing sensitive knowledge must be protected against unauthorized access. Seeing this it has become necessary to hide sensitive knowledge in database. To address this problem, Privacy Preservation Data Mining (PPDM) include association rule hiding method to protect privacy of sensitive data against association rule mining. In this paper, we survey existing approaches to association rule hiding, along with some open challenges. We have also summarized few of the recent evolution.

[1]  AlpanGülgün,et al.  Risk assessment and management for supply chain networks , 2010 .

[2]  Taneli Mielikäinen,et al.  On Inverse Frequent Set Mining , 2003 .

[3]  Vassilios S. Verykios Association rule hiding methods , 2009, Encyclopedia of Data Warehousing and Mining.

[4]  Dhiren R. Patel,et al.  Maintaining privacy and data quality in privacy preserving association rule mining , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[5]  Yücel Saygin,et al.  Privacy preserving association rule mining , 2002, Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002.

[6]  Shyue-Liang Wang,et al.  Using unknowns for hiding sensitive predictive association rules , 2005, IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005..

[7]  Udai Pratap Rao,et al.  Hiding sensitive association rules to maintain privacy and data quality in database , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[8]  Somjit Arch-int,et al.  Association rule hiding in risk management for retail supply chain collaboration , 2013, Comput. Ind..

[9]  Arbee L. P. Chen,et al.  Hiding Sensitive Association Rules with Limited Side Effects , 2007, IEEE Transactions on Knowledge and Data Engineering.

[10]  Philip S. Yu,et al.  A border-based approach for hiding sensitive frequent itemsets , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[11]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[12]  Vassilios S. Verykios,et al.  Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).

[13]  Chris Clifton,et al.  Using unknowns to prevent discovery of association rules , 2001, SGMD.

[14]  K. Duraiswamy,et al.  Advanced Approach in Sensitive Rule Hiding , 2009 .

[15]  Aris Gkoulalas-Divanis,et al.  Exact Knowledge Hiding through Database Extension , 2009, IEEE Transactions on Knowledge and Data Engineering.

[16]  Amit Thakkar,et al.  A Study on Association Rule Hiding Approaches , 2012 .

[17]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[18]  Dhiren R. Patel,et al.  A Survey on Preserving Privacy for Sensitive Association Rules in Databases , 2010, BAIP.

[19]  Aris Gkoulalas-Divanis,et al.  An integer programming approach for frequent itemset hiding , 2006, CIKM '06.

[20]  A. Tamilarasi,et al.  Privacy preserving data mining based on association rule- a survey , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[21]  Yücel Saygin,et al.  Secure Association Rule Sharing , 2004, PAKDD.

[22]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[23]  Elisa Bertino,et al.  Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.

[24]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[25]  Gonca Tuncel,et al.  Risk assessment and management for supply chain networks: A case study , 2010, Comput. Ind..

[26]  Yuhong Guo Reconstruction-Based Association Rule Hiding , 2007 .

[27]  George V. Moustakides,et al.  A Max-Min Approach for Hiding Frequent Itemsets , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).

[28]  Tzung-Pei Hong,et al.  Hiding Sensitive Association Rules on Stars , 2010, 2010 IEEE International Conference on Granular Computing.