A Survey on Sanitizing Methods in Association Rule Hiding Technique

Authors(2) :-Apoorva Joshi , Pratima Gautam

In current years, the use of data mining techniques and related applications has enlarged a lot as it is used to extract important knowledge from large amount of data. Now a days the incredible growth of data in every field[1]. This increment of the data created lots of challenges in privacy. Privacy preserving in data mining becomes too essential due to share this data for our benefit purpose[2].This shared data may contain sensitive attributes, Database containing sensitive knowledge must be protected against illegal access. Therefore this it has become necessary to hide sensitive knowledge in database. Privacy preserving data mining (PPDM) try to conquer this problem by protecting the privacy of data without sacrificing the integrity of data. A number of techniques have been proposed for privacy-preserving data mining. To address this problem, Privacy Preservation Data Mining (PPDM) include association rule hiding method to protect privacy of sensitive data against association rule mining. In this paper, we survey different existing approaches to association rule hiding, along with some open challenges. We have also summarized few of the recent evolution. and a review of different techniques for privacy preserving data mining along with merits and demerits.

Authors and Affiliations

Apoorva Joshi
Career College Bhopal, Aisect University, Bhopal, Madhya Pradesh, India
Pratima Gautam
Career College Bhopal, Aisect University, Bhopal, Madhya Pradesh, India

Privacy Preservation Data Mining, Association rule hiding, Data Mining

  1. Khyati B. Jadav,  Jignesh Vania ,  Dhiren R. Patel  “A Survey on Association Rule Hiding Methods,” .In Proc. of the International Journal of Computer Applications (0975 – 8887) Volume 82 – No 13, November 2013 
  2. Nidhi Jain, Prof.Angad Singh, “A Survey On Privacy Preserving Mining Various Techniques With Attacks”. In Proceedings Of  International Journal Of Research In Computer Applications And Robotics,Volume 5,Issue 5,Issn 2320-7345
  3. Peng Cheng1,3 • John F. Roddick2 • Shu-Chuan Chu2 • Chun-Wei Lin1, “Privacy Preservation Through A Greedy, Distortion-Based Rule-Hiding Method”. In Proc. Of The Springer Science+Business Media New York 2015
  4. George V. Moustakides a, Vassilios S. Verykios b,*”A MaxMin approach for hiding frequent itemsets”, Data & Knowledge Engineering 65 (2008) 75–89
  5. Saad M. Darwish, Magda M. Madbouly, And Mohamed A. El-Hakeem” A Database Sanitizing Algorithm For Hiding Sensitive Multi-Level Association Rule Mining” International Journal Of Computer And Communication Engineering, Vol. 3, No. 4, July 2014
  6. Neelkamal Upadhyay, Kuldeep Tripathi, Prof. Ashish Mishra” A Survey  Of Association Rule Hiding Approachesiracst - International Journal Of Computer Science And Information Technology & Security (Ijcsits), Issn: 2249-9555 Vol. 5, No1, February 2015
  7. Umesh Kumar Sahu, Anju Singh” Approaches For Privacy Preserving Data Mining By Various Associations Rule Hiding Algorithms – A Survey” International Journal Of Computer Applications (0975 – 8887) Volume 134 – No.11, January 2016
  8. Kasthuri S1 And Meyyappan T2” Hiding Sensitive Association Rule Using Heuristic Approach” International Journal Of Data Mining & Knowledge Management Process (Ijdkp) Vol.3, No.1, January 2013 Doi
  9. Saad M. Darwish, Magda M. Madbouly, And Mohamed A. El-Hakeem” A Database Sanitizing Algorithm For Hiding Sensitive Multi-Level Association Rule Mining” International Journal Of Computer And Communication Engineering, Vol. 3, No. 4, July 2014
  10. Divya C. Kalariya, Vinita Shah; Jay Vala” Association Rule Hiding Based On Heuristic Approach By Deleting Item At R.H.S. Side Of Sensitive Rule” International Journal Of Computer Applications (0975 – 8887) Volume 122 – No.8, July 2015
  11. Komal Shah, Amit Thakkar & Amit Ganatra “A Study On Association Rule Hiding Approaches” International Journal Of Engineering And Advanced Technology (Ijeat) Issn: 2249 – 8958, Volume-1, Issue-3, February 2012, Pp. 72-76.
  12. Gayathiri P ,Dr. B Poorna”Association Rule Hiding Techniques For Privacy Preserving Data Mining: A Study, (Ijacsa) International Journal Of Advanced Computer Science And Applications, Vol. 6, No. 12, 2015
  13. Mohamed Refaat Abdellah, H. Aboelseoud M. Khalid Shafee Badran,  M. Badr Senousy”  Privacy Preserving Association Rule Hiding Techniques: Current Research Challenges” International Journal Of Computer Applications (0975 – 8887) Volume 136 – No.6, February 2016
  14. Vassilios S. Verykios, Aris Gkoulalas-Divanis,” A Survey Of Association Rule Hiding Methods For Privacy”Springer Volume 34
  15. Vassilios S. Verykios∗”Association Rule Hiding Methods” Wires Data Mining Knowl Discov 2013, 3: 28–36 Doi: 10.1002/Widm.1082
  16. Supriya Borhade” A Survey On Privacy Preserving Data Mining Techniques” Issn 2250-2459, Iso 9001:2008 Certified Journal, Volume 5, Issue 2, February 2015

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 780-785
Manuscript Number : CSEIT1726215
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Apoorva Joshi , Pratima Gautam, "A Survey on Sanitizing Methods in Association Rule Hiding Technique", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.780-785, November-December-2017. |          | BibTeX | RIS | CSV

Article Preview