New Approach Data Hiding Techniques for Data Mining

Hits: 2055
Research areas:
Year:
2012
Type of Publication:
Article
Keywords:
Data Privacy, Association Rules, Hiding Techniques
Authors:
Deepak Chopra; Dilip Vishwakarma
Journal:
IJAIM
Volume:
1
Number:
1
Pages:
24-28
Month:
October
ISSN:
2320-5121
Abstract:
Data mining techniques are the result of a long process of research and product development. This evolution began when business data was first stored on computers, continued with improvements in data access, and more recently, generated technologies that allow users to navigate through their data in real time. APRIORI algorithm, a popular data mining technique and compared the performances of a linked list based implementation as a basis and a tries-based implementation on it for mining frequent item sequences in a transactional database. In this paper we examine the data structure, implementation and algorithmic features mainly focusing on those that also arise in frequent item set mining. This algorithm has given us new capabilities to identify associations in large data sets. But a key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public, since among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. So, next we worked with some association rule hiding algorithms and examined their performances in order to analyze their time complexity and the impact that they have in the original database.
Full text: IJAIM-08 Final.pdf

Indexed By