Association rule hiding

Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security research community and for the government statistical agencies. Recent advances i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on knowledge and data engineering 2004-04, Vol.16 (4), p.434-447
Hauptverfasser: Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 447
container_issue 4
container_start_page 434
container_title IEEE transactions on knowledge and data engineering
container_volume 16
creator Verykios, V.S.
Elmagarmid, A.K.
Bertino, E.
Saygin, Y.
Dasseni, E.
description Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security research community and for the government statistical agencies. Recent advances in data mining and machine learning algorithms have increased the disclosure risks that one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. We investigate confidentiality issues of a broad category of rules, the association rules. In particular, we present three strategies and five algorithms for hiding a group of association rules, which is characterized as sensitive. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. We also perform an evaluation study of the hiding algorithms in order to analyze their time complexity and the impact that they have in the original database.
doi_str_mv 10.1109/TKDE.2004.1269668
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_28624474</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1269668</ieee_id><sourcerecordid>29639206</sourcerecordid><originalsourceid>FETCH-LOGICAL-c432t-d4faf1c56dc0a0c20a6eea7094a5a6158c9022c8ed3c6e75cd9c5feb737dd5643</originalsourceid><addsrcrecordid>eNqFkE1Lw0AQhhdRsFbPIl6KBz0lzuz3HkutH1jwUs_LurvRlDSp2ebgvzehBcGDnmZgnneGeQi5QMgRwdwun-_mOQXgOVJppNQHZIRC6IyiwcO-B44ZZ1wdk5OUVgCglcYROZ-m1PjSbcumnrRdFScfZSjr91NyVLgqxbN9HZPX-_ly9pgtXh6eZtNF5jmj2yzwwhXohQweHHgKTsboFBjuhJMotDdAqdcxMC-jEj4YL4r4ppgKQUjOxuRmt3fTNp9dTFu7LpOPVeXq2HTJaiMpV0yynrz-k6RGMkNB_g_qfiVXw-2rX-Cq6dq6f9caipQDUugh3EG-bVJqY2E3bbl27ZdFsIN6O6i3g3q7V99nLneZMsb4w--n3z3mfRg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>921240120</pqid></control><display><type>article</type><title>Association rule hiding</title><source>IEEE Electronic Library (IEL)</source><creator>Verykios, V.S. ; Elmagarmid, A.K. ; Bertino, E. ; Saygin, Y. ; Dasseni, E.</creator><creatorcontrib>Verykios, V.S. ; Elmagarmid, A.K. ; Bertino, E. ; Saygin, Y. ; Dasseni, E.</creatorcontrib><description>Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security research community and for the government statistical agencies. Recent advances in data mining and machine learning algorithms have increased the disclosure risks that one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. We investigate confidentiality issues of a broad category of rules, the association rules. In particular, we present three strategies and five algorithms for hiding a group of association rules, which is characterized as sensitive. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. We also perform an evaluation study of the hiding algorithms in order to analyze their time complexity and the impact that they have in the original database.</description><identifier>ISSN: 1041-4347</identifier><identifier>EISSN: 1558-2191</identifier><identifier>DOI: 10.1109/TKDE.2004.1269668</identifier><identifier>CODEN: ITKEEH</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Association rules ; Business ; Categories ; Data mining ; Data security ; Disclosure ; Encounters ; Government ; Information security ; Machine learning algorithms ; Performance evaluation ; Privacy ; Protection ; Repositories ; Risk ; Studies</subject><ispartof>IEEE transactions on knowledge and data engineering, 2004-04, Vol.16 (4), p.434-447</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c432t-d4faf1c56dc0a0c20a6eea7094a5a6158c9022c8ed3c6e75cd9c5feb737dd5643</citedby><cites>FETCH-LOGICAL-c432t-d4faf1c56dc0a0c20a6eea7094a5a6158c9022c8ed3c6e75cd9c5feb737dd5643</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1269668$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1269668$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Verykios, V.S.</creatorcontrib><creatorcontrib>Elmagarmid, A.K.</creatorcontrib><creatorcontrib>Bertino, E.</creatorcontrib><creatorcontrib>Saygin, Y.</creatorcontrib><creatorcontrib>Dasseni, E.</creatorcontrib><title>Association rule hiding</title><title>IEEE transactions on knowledge and data engineering</title><addtitle>TKDE</addtitle><description>Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security research community and for the government statistical agencies. Recent advances in data mining and machine learning algorithms have increased the disclosure risks that one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. We investigate confidentiality issues of a broad category of rules, the association rules. In particular, we present three strategies and five algorithms for hiding a group of association rules, which is characterized as sensitive. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. We also perform an evaluation study of the hiding algorithms in order to analyze their time complexity and the impact that they have in the original database.</description><subject>Algorithms</subject><subject>Association rules</subject><subject>Business</subject><subject>Categories</subject><subject>Data mining</subject><subject>Data security</subject><subject>Disclosure</subject><subject>Encounters</subject><subject>Government</subject><subject>Information security</subject><subject>Machine learning algorithms</subject><subject>Performance evaluation</subject><subject>Privacy</subject><subject>Protection</subject><subject>Repositories</subject><subject>Risk</subject><subject>Studies</subject><issn>1041-4347</issn><issn>1558-2191</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNqFkE1Lw0AQhhdRsFbPIl6KBz0lzuz3HkutH1jwUs_LurvRlDSp2ebgvzehBcGDnmZgnneGeQi5QMgRwdwun-_mOQXgOVJppNQHZIRC6IyiwcO-B44ZZ1wdk5OUVgCglcYROZ-m1PjSbcumnrRdFScfZSjr91NyVLgqxbN9HZPX-_ly9pgtXh6eZtNF5jmj2yzwwhXohQweHHgKTsboFBjuhJMotDdAqdcxMC-jEj4YL4r4ppgKQUjOxuRmt3fTNp9dTFu7LpOPVeXq2HTJaiMpV0yynrz-k6RGMkNB_g_qfiVXw-2rX-Cq6dq6f9caipQDUugh3EG-bVJqY2E3bbl27ZdFsIN6O6i3g3q7V99nLneZMsb4w--n3z3mfRg</recordid><startdate>20040401</startdate><enddate>20040401</enddate><creator>Verykios, V.S.</creator><creator>Elmagarmid, A.K.</creator><creator>Bertino, E.</creator><creator>Saygin, Y.</creator><creator>Dasseni, E.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7TB</scope><scope>FR3</scope><scope>F28</scope></search><sort><creationdate>20040401</creationdate><title>Association rule hiding</title><author>Verykios, V.S. ; Elmagarmid, A.K. ; Bertino, E. ; Saygin, Y. ; Dasseni, E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c432t-d4faf1c56dc0a0c20a6eea7094a5a6158c9022c8ed3c6e75cd9c5feb737dd5643</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Algorithms</topic><topic>Association rules</topic><topic>Business</topic><topic>Categories</topic><topic>Data mining</topic><topic>Data security</topic><topic>Disclosure</topic><topic>Encounters</topic><topic>Government</topic><topic>Information security</topic><topic>Machine learning algorithms</topic><topic>Performance evaluation</topic><topic>Privacy</topic><topic>Protection</topic><topic>Repositories</topic><topic>Risk</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Verykios, V.S.</creatorcontrib><creatorcontrib>Elmagarmid, A.K.</creatorcontrib><creatorcontrib>Bertino, E.</creatorcontrib><creatorcontrib>Saygin, Y.</creatorcontrib><creatorcontrib>Dasseni, E.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Engineering Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on knowledge and data engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Verykios, V.S.</au><au>Elmagarmid, A.K.</au><au>Bertino, E.</au><au>Saygin, Y.</au><au>Dasseni, E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Association rule hiding</atitle><jtitle>IEEE transactions on knowledge and data engineering</jtitle><stitle>TKDE</stitle><date>2004-04-01</date><risdate>2004</risdate><volume>16</volume><issue>4</issue><spage>434</spage><epage>447</epage><pages>434-447</pages><issn>1041-4347</issn><eissn>1558-2191</eissn><coden>ITKEEH</coden><abstract>Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security research community and for the government statistical agencies. Recent advances in data mining and machine learning algorithms have increased the disclosure risks that one may encounter when releasing data to outside parties. A key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. Every disclosure limitation method affects, in some way, and modifies true data values and relationships. We investigate confidentiality issues of a broad category of rules, the association rules. In particular, we present three strategies and five algorithms for hiding a group of association rules, which is characterized as sensitive. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. We also perform an evaluation study of the hiding algorithms in order to analyze their time complexity and the impact that they have in the original database.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TKDE.2004.1269668</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1041-4347
ispartof IEEE transactions on knowledge and data engineering, 2004-04, Vol.16 (4), p.434-447
issn 1041-4347
1558-2191
language eng
recordid cdi_proquest_miscellaneous_28624474
source IEEE Electronic Library (IEL)
subjects Algorithms
Association rules
Business
Categories
Data mining
Data security
Disclosure
Encounters
Government
Information security
Machine learning algorithms
Performance evaluation
Privacy
Protection
Repositories
Risk
Studies
title Association rule hiding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T17%3A49%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Association%20rule%20hiding&rft.jtitle=IEEE%20transactions%20on%20knowledge%20and%20data%20engineering&rft.au=Verykios,%20V.S.&rft.date=2004-04-01&rft.volume=16&rft.issue=4&rft.spage=434&rft.epage=447&rft.pages=434-447&rft.issn=1041-4347&rft.eissn=1558-2191&rft.coden=ITKEEH&rft_id=info:doi/10.1109/TKDE.2004.1269668&rft_dat=%3Cproquest_RIE%3E29639206%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=921240120&rft_id=info:pmid/&rft_ieee_id=1269668&rfr_iscdi=true