CFP last date
20 January 2025
Reseach Article

A Comprehensive Study of Privacy Preservation Techniques in a Distributed Association Rule Mining

by Nusrat Jabeen. T, M.chidambaram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 2
Year of Publication: 2014
Authors: Nusrat Jabeen. T, M.chidambaram
10.5120/18884-0163

Nusrat Jabeen. T, M.chidambaram . A Comprehensive Study of Privacy Preservation Techniques in a Distributed Association Rule Mining. International Journal of Computer Applications. 108, 2 ( December 2014), 26-28. DOI=10.5120/18884-0163

@article{ 10.5120/18884-0163,
author = { Nusrat Jabeen. T, M.chidambaram },
title = { A Comprehensive Study of Privacy Preservation Techniques in a Distributed Association Rule Mining },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 2 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number2/18884-0163/ },
doi = { 10.5120/18884-0163 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:57.812818+05:30
%A Nusrat Jabeen. T
%A M.chidambaram
%T A Comprehensive Study of Privacy Preservation Techniques in a Distributed Association Rule Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 2
%P 26-28
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Association rule mining is a popular technique in data mining process which tries to find interesting associations and correlations among various data items in a transaction. Many business organizations share data with others, outsource their business data for specific business solution. In these situations, the sensitive information leakage is the biggest problem. Strong and efficient privacy preserving techniques are needed to secure organization's data during third party sharing. In this paper, a comprehensive study of various methods for privacy preservation is presented which evaluates and analyzes various techniques for maintaining privacy during association rule mining process. Moreover, paper also prospects the development of privacy preservation for future applications.

References
  1. Jiawei Han, Hong Cheng, Dong Xin and Xifeng Yan, "Frequent pattern mining: current status and future directions", Data Min Knowledge Disc (2007) 15:55–86
  2. Razan Paul, Tudor Groza, Jane Hunter and Andreas Zankl, "Semantic interestingness measures for discovering association rules in the skeletal dysplasia domain", Journal of Biomedical Semantics 2014, 5:8
  3. Frank S. C. Tseng and Pey-Yen Chen, "Parallel Association Rule Mining by Data De-Clustering to Support Grid Computing"
  4. Shashikumar G. Totad, Geeta R. B, Chennupati R Prasanna, N Krishna Santhosh and Prasad Reddy, "Scaling Data Mining Algorithms to Large and Distributed Datasets", International Journal of Database Management Systems (IJDMS ), Vol. 2, No. 4, November 2010
  5. Yehuda Lindell and Benny Pinkas, "Secure Multiparty Computation for Privacy-Preserving Data Mining", The Journal of Privacy and Confidentiality (2009) 1, Number 1, pp. 59-98
  6. P. Kamakshi and Dr. A. Vinaya Babu, "Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data", JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617
  7. Elisa Bertino, Dan Lin and Wei Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms"
  8. Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham, "The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data", Sixth IEEE International Conference on Data Mining-Workshops (ICDMW'06) 0-7695-2702-7/06
  9. Animesh Tripathy and Matrubhumi Pradhan. 2012. A novel framework for preserving privacy of data using correlation analysis. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI '12). ACM, New York, NY, USA, 650-655.
  10. Luciano Bononi, Michele Bracuto, Gabriele D'Angelo and Lorenzo Donatiello. 2005. Concurrent Replication of Parallel and Distributed Simulations. In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation (PADS '05). IEEE Computer Society, Washington, DC, USA, 234-243.
  11. Dragos N. Trinca. 2008. Fast and Cost-Effective Algorithms for Information Extraction in some Computational Domains. Ph. D. Dissertation. University of Connecticut, Storrs, CT, USA. AAI3345214.
  12. Yongcheng Luo, Yan Zhao and Jiajin Le. 2009. A Survey on the Privacy Preserving Algorithm of Association Rule Mining. In Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security - Volume 01 (ISECS '09), Vol. 1. IEEE Computer Society, Washington, DC, USA, 241-245
  13. Jaideep Vaidya, Chris Clifton, Murat Kantarcioglu and A. Scott Patterson. 2008. Privacy-preserving decision trees over vertically partitioned data. ACM Trans. Knowl. Discov. Data 2, 3, Article 14 (October 2008)
  14. Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong and Yu-Lung Wu. 2010. Hiding collaborative recommendation association rules on horizontally partitioned data. Intell. Data Anal. 14, 1 (January 2010), 47-67.
  15. Stefan Edelkamp, Stefan Schroedl, and Sven Koenig. 2010. Heuristic Search: Theory and Applications. Morgan Kaufmann Publishers Inc. , San Francisco, CA, USA.
  16. Graham Cormode, Minos Garofalakis, Peter J. Haas, and Chris Jermaine. 2012. Synopsis for Massive Data: Samples, Histograms, Wavelets, Sketches. Found. Trends databases 4, 1–3 (January 2012), 1-294
  17. Ralph Hughes. 2012. Agile Data Warehousing Project Management: Business Intelligence Systems Using Scrum. Morgan Kaufmann Publishers Inc. , San Francisco, CA, USA.
Index Terms

Computer Science
Information Sciences

Keywords

Association rule mining ARM Privacy Preservation Data Sanitization Data Distortion Data Perturbation Cryptography Frequent Patterns