We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Privacy Preserving Data Mining based on Ant Colony Optimization

by S. Narmadha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 8
Year of Publication: 2013
Authors: S. Narmadha
10.5120/14469-2758

S. Narmadha . Privacy Preserving Data Mining based on Ant Colony Optimization. International Journal of Computer Applications. 83, 8 ( December 2013), 21-25. DOI=10.5120/14469-2758

@article{ 10.5120/14469-2758,
author = { S. Narmadha },
title = { Privacy Preserving Data Mining based on Ant Colony Optimization },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 8 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number8/14469-2758/ },
doi = { 10.5120/14469-2758 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:49.455053+05:30
%A S. Narmadha
%T Privacy Preserving Data Mining based on Ant Colony Optimization
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 8
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of the large database that contains certain decisive information, it will become a serious issue when sharing database to the network against unauthorized access. Specifically consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the merger of their databases, without revealing any unnecessary information. Our work is motivated by the need to both protect privileged information and enable its use for business or other purposes. Privacy preserving data mining technique is a new research area in data mining and statistical databases where mining algorithms are analyzed for the side effect they acquire in data privacy. Association rule hiding is a worthwhile technique for protecting confidential data and crucial information in a database. Data modification techniques, query auditing methods, statistical techniques are developed and used for protecting the database. Many optimization techniques also used with the data mining concept for protecting the data base. In this paper using ant colony optimization technique with association rule mining for hiding sensitive items in large data base.

References
  1. A. Gkoulalas-Divanis and V. S. Verykios, Association Rule Hiding for Data Mining, Advances in Database Systems 41, DOI 10, 1007/978-1-4419-6569-1_2, Springer Science + Business Media, LLC 2010
  2. Bikramjit Saikia, Debkumar Bhowmik "Study of Association Rule Mining And different hiding Techniques" Department of computer Science Engineering, National Institute of Technology,Rourkela.
  3. Charu C. Aggarwal IBM T. J. Watson Research Center, USA and Philip S. "Privacy Preserving Data Mining: Models and algorithms" Yu University of AIllinois at Chicago, USA.
  4. Dasseni,V. S. Verykios, A. Elmagarmid, and E. Bertino. Hiding association rules by using confidence and support. In: Proc. of the 4th Int'l Information Hiding Workshop (IHW'01). Springer-Verlag, 2001. 369-383.
  5. E. D. Pontikakis, A. Tsitsonis, and V. S. Verykios. An experimental study of distortion-based techniques for association rule hiding. In Proc. of the 18th Annual IFIP WG 11. 3 Working Conf. on Data and Applications Security. 2004.
  6. M. Atallah, E. Bertino, A. Elmagarmid,M. Ibrahim and V. Verykios. Disclosure limitation of sensitive rules. Proc. Of IEEE Knowledge and Data Engineering Exchange Workshop (KDEX), November 1999.
  7. Mohammad Naderi Dehkordi, Kambiz Badie, Ahmad Khadem Zadeh "A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms" , Journal of Software, Vol. 4, No. 6 August 2009
  8. Nada M. A. Al Salami "Ant Colony Optimization Algorithm" Rakesh Agrawal,Tomasz lmielinski,Arun Swami "Mining Association Rules between sets of items in Large Databases". IBM Almaden Research Center,San Jose,CA 95120.
  9. T. Johnsten, V. Raghavan, K. Hill: The security assessment of association mining algorithms. In: Proceedings of the 16th Annual IFIP WG 11. 3 Working Conference on Database Applications Security, pp. 163–174 ,2002.
  10. Vaidya, j. Clifton, . W; Zhu, Y. M 2006, X, 121 p, 20 illus, Hardcover"Privacy Preserving Data Mining" ISBN: 979-0-387-25886-7.
  11. Vittorio Maniezzo, Luca Maria Gambardella, Fabio de Luigi "Ant colony optimization".
  12. V. Verykios, A. Elmagarmid, E. Bertino, Y. Saygin and E. Dasseni. Association Rule Hiding. IEEE Trans. On Knowledge and Data Engineering, 16(4), 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Privacy Rule hiding Ant colony algorithm.