Cargando…

Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in re...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Chun-Wei, Zhang, Binbin, Yang, Kuo-Tung, Hong, Tzung-Pei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4165802/
https://www.ncbi.nlm.nih.gov/pubmed/25254239
http://dx.doi.org/10.1155/2014/398269
_version_ 1782335146753523712
author Lin, Chun-Wei
Zhang, Binbin
Yang, Kuo-Tung
Hong, Tzung-Pei
author_facet Lin, Chun-Wei
Zhang, Binbin
Yang, Kuo-Tung
Hong, Tzung-Pei
author_sort Lin, Chun-Wei
collection PubMed
description Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA) mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects.
format Online
Article
Text
id pubmed-4165802
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41658022014-09-24 Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms Lin, Chun-Wei Zhang, Binbin Yang, Kuo-Tung Hong, Tzung-Pei ScientificWorldJournal Research Article Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA) mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects. Hindawi Publishing Corporation 2014 2014-09-01 /pmc/articles/PMC4165802/ /pubmed/25254239 http://dx.doi.org/10.1155/2014/398269 Text en Copyright © 2014 Chun-Wei Lin et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Lin, Chun-Wei
Zhang, Binbin
Yang, Kuo-Tung
Hong, Tzung-Pei
Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
title Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
title_full Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
title_fullStr Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
title_full_unstemmed Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
title_short Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
title_sort efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4165802/
https://www.ncbi.nlm.nih.gov/pubmed/25254239
http://dx.doi.org/10.1155/2014/398269
work_keys_str_mv AT linchunwei efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms
AT zhangbinbin efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms
AT yangkuotung efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms
AT hongtzungpei efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms