Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Protection of Data from a Semi-Honest Party Using Fast Association Rule Hiding


Affiliations
1 Karunya University, India
     

   Subscribe/Renew Journal


Data mining technique is an emerging technique applied in strategic decision-making as well as in many more application areas. Nevertheless, it also has a few demerits apart from its utility. The data mining tools may bring out information that should not be disclosed to a semi honest party. Different approaches are being used to hide the sensitive information. This paper proposes a novel method to access the generating transactions from the transactional database. It helps in reducing the time and space complexities of any hiding algorithm. Theoretical and empirical analysis of the algorithm shows that hiding of data using this proposed technique performs association rule hiding quicker than other algorithms.


Keywords

Data Mining, Association Rules Mining, Privacy, Security, Sanitized Database.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 231

PDF Views: 4




  • Protection of Data from a Semi-Honest Party Using Fast Association Rule Hiding

Abstract Views: 231  |  PDF Views: 4

Authors

John Blesswin
Karunya University, India
Cyju Varghese
Karunya University, India
Navitha Varghese
Karunya University, India
Sonia Singha
Karunya University, India

Abstract


Data mining technique is an emerging technique applied in strategic decision-making as well as in many more application areas. Nevertheless, it also has a few demerits apart from its utility. The data mining tools may bring out information that should not be disclosed to a semi honest party. Different approaches are being used to hide the sensitive information. This paper proposes a novel method to access the generating transactions from the transactional database. It helps in reducing the time and space complexities of any hiding algorithm. Theoretical and empirical analysis of the algorithm shows that hiding of data using this proposed technique performs association rule hiding quicker than other algorithms.


Keywords


Data Mining, Association Rules Mining, Privacy, Security, Sanitized Database.