Cargando…
Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms
Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in re...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4165802/ https://www.ncbi.nlm.nih.gov/pubmed/25254239 http://dx.doi.org/10.1155/2014/398269 |
_version_ | 1782335146753523712 |
---|---|
author | Lin, Chun-Wei Zhang, Binbin Yang, Kuo-Tung Hong, Tzung-Pei |
author_facet | Lin, Chun-Wei Zhang, Binbin Yang, Kuo-Tung Hong, Tzung-Pei |
author_sort | Lin, Chun-Wei |
collection | PubMed |
description | Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA) mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects. |
format | Online Article Text |
id | pubmed-4165802 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-41658022014-09-24 Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms Lin, Chun-Wei Zhang, Binbin Yang, Kuo-Tung Hong, Tzung-Pei ScientificWorldJournal Research Article Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA) mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects. Hindawi Publishing Corporation 2014 2014-09-01 /pmc/articles/PMC4165802/ /pubmed/25254239 http://dx.doi.org/10.1155/2014/398269 Text en Copyright © 2014 Chun-Wei Lin et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Lin, Chun-Wei Zhang, Binbin Yang, Kuo-Tung Hong, Tzung-Pei Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms |
title | Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms |
title_full | Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms |
title_fullStr | Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms |
title_full_unstemmed | Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms |
title_short | Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms |
title_sort | efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4165802/ https://www.ncbi.nlm.nih.gov/pubmed/25254239 http://dx.doi.org/10.1155/2014/398269 |
work_keys_str_mv | AT linchunwei efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms AT zhangbinbin efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms AT yangkuotung efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms AT hongtzungpei efficientlyhidingsensitiveitemsetswithtransactiondeletionbasedongeneticalgorithms |