CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Protecting Sensitive Association Rules in Privacy Preserving Data Mining using Genetic Algorithms

by S.Narmadha, S.Vijayarani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 33 - Number 7
Year of Publication: 2011
Authors: S.Narmadha, S.Vijayarani
10.5120/4035-5780

S.Narmadha, S.Vijayarani . Protecting Sensitive Association Rules in Privacy Preserving Data Mining using Genetic Algorithms. International Journal of Computer Applications. 33, 7 ( November 2011), 36-43. DOI=10.5120/4035-5780

@article{ 10.5120/4035-5780,
author = { S.Narmadha, S.Vijayarani },
title = { Protecting Sensitive Association Rules in Privacy Preserving Data Mining using Genetic Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 33 },
number = { 7 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 36-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume33/number7/4035-5780/ },
doi = { 10.5120/4035-5780 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:19:35.448459+05:30
%A S.Narmadha
%A S.Vijayarani
%T Protecting Sensitive Association Rules in Privacy Preserving Data Mining using Genetic Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 33
%N 7
%P 36-43
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy and security risks taken place from the application of different data mining techniques to great organizational data storehouses have been exclusively inspected by a new research domain, the so-called privacy preserving data mining. Association rule hiding is one of the privacy preserving techniques which study the problem of hiding sensitive association rules. There are many algorithms and techniques were developed to solve this problem. In this research work, we have used genetic algorithm optimization technique for protecting sensitive association rules.

References
  1. Abedelaziz Mohaisen and Dowon Hong. 2008. Privacy Preserving Association Rule Mining Revisited. Journal of the Computing Research Repository.
  2. Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios. V. 1999. Disclosure limitation of sensitive rules. Workshop on Knowledge and Data Engineering Exchange.
  3. Bikramjit Saikia, Debkumar Bhowmik. Study of Association Rule Mining And different hiding Techniques. Department of computer Science Engineering, National Institute of Technology,Rourkela.
  4. Charu C. Aggarwal and Philip S. Privacy-preserving data mining: Models and Algorithms. ISBN: 0-387-70991-8.
  5. Colin R.Reeves, Jonathan E.Rowe. 2002. Genetic algorithms principles and perspectives.
  6. Darrell Whitley. 1994. A genetic algorithm tutorial. Colorado State University.
  7. Juggapong Natwichai, Xingzhi Sun, and Xue . 2008. A Heuristic Data Reduction Approach for Associative Classification Rule Hiding. Pacific rim international conference on artificial inteligence-PRICAI.
  8. Mohammad Naderi Dehkordi. 2009. A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms. Journal of software-JSW, volume 4,no 6.
  9. Nan Zhang, Shengquan Wang, and Wei Zhao. 2004. A New Scheme on Privacy Preserving Association Rule Mining. Principles of Data Mining and Knowledge Discovery – PKDD, Volume 3202, Pg: 484-495,
  10. Rakesh Agrawal,Tomasz lmielinski,Arun Swami. Mining Association Rules between sets of items in Large Databases.IBM Almaden Research Center,San Jose,CA 95120.
  11. R.R.Rajalaxmi. A Novel Sanitization Approach for Privacy Preserving Utility Itemset Mining”, Computer Science and Engineering Kongu Engineering College Erode, TamilNadu, India.
  12. Shyue-Liang Wang Yu-Huei Lee Billis, S. Jafari. 2006. A. Hiding Sensitive items in Privacy Preserving Association rule Mining.
  13. Vaidya, j.Clifton, .W; Zhu, Y.M 2006, X, 121 p, 20 illus, Hardcover..Privacy Preserving Data Mining. ISBN: 979-0-387-25886-7.
  14. Vassilios S. Verykios • Emmanuel D. Pontikakis • Yannis Theodoridis • Liwu Chang. 2007. Efficient algorithms for distortion and blocking techniques in association rule hiding, springer.
  15. Yucel Saygin, Vassilios S.Verkios, Ahmed K. Elmagarmid,. 2002.Privacy Preserving Association Rule Mining. Conference of Research Issues in Data Engineering – RIDE.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Association rule Sensitive Hiding Genetic Algorithm