Anda di halaman 1dari 1

Association Rule Hiding Methods

deleting, the supporting transactions by removing some the systematic work all these years have created a lot of
items until the sensitive itemsets are protected. The third research results, there is still a lot of work to be done.
heuristic combines the previous two by using the first Apart from ongoing work in the field we foresee the
approach to identify the sensitive transactions and the need of applying these techniques to operational data
second one to remove items from these transactions, warehouses so that we can evaluate in a real environ-
until the sensitive knowledge is hidden. ment their effectiveness and applicability. We also
Still another approach (Oliveira, Zaiane & Saygin, envision the necessity of applying knowledge hiding
2004) investigates the distribution of non-sensitive rules techniques to distributed environments where infor-
for security reasons instead of publishing the perturbed mation and knowledge is shared among collaborators
database. The proposed approach presents a rule sani- and/or competitors.
tization algorithm for blocking inference channels that
may lead to the disclosure of sensitive rules.
REFERENCES

FUTURE TRENDS Agrawal, R., & Srikant, R.(2000). Privacy-Preserving


Data Mining. SIGMOD Conference, 439-450.
Many open issues related to the association rule hiding
Amiri, A. (2007). Dare to share: Protecting Sensitive
problem are still under investigation. The emergence of
Knowledge with Data Sanitization. Decision Support
sophisticated exact hiding approaches of extremely high
Systems, 43(1), 181-191.
complexity, especially for very large databases, causes
the consideration of efficient parallel approaches to be Atallah, M., Bertino, E., Elmagarmid, A.K., Ibrahim,
employed for the solution of this problem. A lot more M., & Verykios, V.S. (1999). Disclosure Limitation of
work is in need to provide hiding solutions that take Sensitive Rules. IEEE Knowledge and Data Engineer-
advantage of the use of unknowns. More sophisticated ing Exchange Workshop, 45-52.
techniques need to emerge regarding the solution of the
hiding problem by making use of database reconstruc- Chen, X., Orlowska, M., & Li, X. (2004). A New
tion approaches. Ongoing work considers yet another Framework for Privacy Preserving Data Sharing, Pri-
solution which is to append to the original database a vacy and Security Aspects of Data Mining Workshop,
synthetically generated database so that the sensitive 47-56.
knowledge is hidden in the combined database which Clifton, C. (2000). Using Sample Size to Limit Expo-
is disclosed to the public. sure to Data Mining. Journal of Computer Security,
8(4), 281-307.

CONCLUSION Dasseni, E., Verykios, V.S., Elmagarmid, A.K., &


Bertino, E. (2000). Hiding Association Rules by Us-
In the information era, privacy comprises one of the ing Confidence and Support. Information Hiding,
most important issues that need to be thoroughly inves- 369-383
tigated and resolved before data and information can be Gkoulalas-Divanis, A., & Verykios, V.S. (2006). An
given to the public to serve different goals. Privacy is integer programming approach for frequent itemset
not constrained to personally identifiable information, hiding. CIKM, 748-757
but it can be equally well refer to business information
or other forms of knowledge which can be produced Mielikainen, T. (2003). On inverse frequent set mining.
from the processing of the data through data mining In Wenliang Du and Chris Clifton (Eds.): Proceedings
and knowledge discovery approaches. The problem of of the 2nd Workshop on Privacy Preserving Data Min-
association rule hiding has been in the forefront of the ing, 18-23. IEEE Computer Society.
privacy preserving data mining area for more than a Menon, S., Sarkar, S., & Mukherjee, S. (2005). Maxi-
decade now. Recently proposed approaches have been mizing Accuracy of Shared Databases when Conceal-
creating enormous impact in the area while at the same ing Sensitive Patterns. Information Systems Research,
time open the way to new research problems. Although 16(3), 256-270.



Anda mungkin juga menyukai