skip to main content
article

Using unknowns to prevent discovery of association rules

Published:01 December 2001Publication History
Skip Abstract Section

Abstract

Data mining technology has given us new capabilities to identify correlations in large data sets. This introduces risks when the data is to be made public, but the correlations are private. We introduce a method for selectively removing individual values from a database to prevent the discovery of a set of rules, while preserving the data for other applications. The efficacy and complexity of this method are discussed. We also present an experiment showing an example of this methodology.

References

  1. D. Agrawal and C. Aggarwal. On the Deisgn and Quantification of Privacy Preserving Data Mining Algorithms. Proceedings of PODS, pages 247-255, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agrawal and R. Srikant. Privacy Preserving Data Mining. Proceedings of SIGMOD Conference, pages 45-52, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. J. Atallah, E. Bertino, A. K. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure Limitation of Sensitive Rules. Proceedings of IEEE Knolwedge and Data Engineering Workshop, pages 45-52, November 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Chang and I. S. Moskowitz. Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. Proceedings of the Workshop of New Security Paradigms, pages 82-89, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Clifton. Using Sample Size to Limit Exposure to Data Mining. Journal of Computer Security, 8(4), 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Elena, V. S. Verykios, A. K. Elmagarmid, and E. Bertino. Hiding Association Rules by using Confidence and Support. To appear in the Proceedings of Information Hiding Workshop, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. H. Hinke, H. S. Delugach, and R. P. Wolf. Protecting databases from inference attacks. Computers and Security, 16(8):687-708, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. U. of California at Irvine Machine Learning Repository. http://www.ics.uci.edu/~mlearn/MLSummary.html.Google ScholarGoogle Scholar
  9. V. S. Verykios, A. K. Elmagarmid, B. Elisa, D. Elena, and Y. Saygin. Association Rule Hiding. IEEE Transactions on Knowledge and Data Engineering, 2000. Under review. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using unknowns to prevent discovery of association rules

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGMOD Record
          ACM SIGMOD Record  Volume 30, Issue 4
          December 2001
          104 pages
          ISSN:0163-5808
          DOI:10.1145/604264
          Issue’s Table of Contents

          Copyright © 2001 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 December 2001

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader