• ورود به سامانه
      مشاهده مورد 
      •   صفحهٔ اصلی
      • نشریات انگلیسی
      • Journal of AI and Data Mining
      • Volume 4, Issue 2
      • مشاهده مورد
      •   صفحهٔ اصلی
      • نشریات انگلیسی
      • Journal of AI and Data Mining
      • Volume 4, Issue 2
      • مشاهده مورد
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Introducing an algorithm for use to hide sensitive association rules through perturb technique

      (ندگان)پدیدآور
      Sakenian Dehkordi, M.Naderi Dehkordi, M.
      Thumbnail
      دریافت مدرک مشاهده
      FullText
      اندازه فایل: 
      1.012 مگابایت
      نوع فايل (MIME): 
      PDF
      نوع مدرک
      Text
      Research/Original/Regular Article
      زبان مدرک
      English
      نمایش کامل رکورد
      چکیده
      Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the association rules is one of the methods to preserve privacy and it is a main subject in the field of data mining and database security, for which several algorithms with different approaches are presented so far. An algorithm to hide sensitive association rules with a heuristic approach is presented in this article, where the Perturb technique based on reducing confidence or support rules is applied with the attempt to remove the considered item from a transaction with the highest weight by allocating weight to the items and transactions. Efficiency is measured by the failure criteria of hiding, number of lost rules and ghost rules, and execution time. The obtained results of this study are assessed and compared with two known FHSAR and RRLR algorithms, based on two real databases (dense and sparse). The results indicate that the number of lost rules in all experiments are reduced by 47% in comparison with RRLR and reduced by 23% in comparison with FHSAR. Moreover, the other undesirable side effects, in this proposed algorithm in the worst case are equal to that of the base algorithms.
      کلید واژگان
      data mining
      Association rule hiding
      Privacy preserving data mining
      H.3.14. Knowledge Management

      شماره نشریه
      2
      تاریخ نشر
      2016-07-01
      1395-04-11
      ناشر
      Shahrood University of Technology
      سازمان پدید آورنده
      Department of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Isfahan, Iran.
      Department of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Isfahan, Iran.

      شاپا
      2322-5211
      2322-4444
      URI
      https://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.10
      http://jad.shahroodut.ac.ir/article_572.html
      https://iranjournals.nlai.ir/handle/123456789/294841

      مرور

      همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

      حساب من

      ورود به سامانهثبت نام

      تازه ترین ها

      تازه ترین مدارک
      © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
      تماس با ما | ارسال بازخورد
      قدرت یافته توسطسیناوب