Abstract:The research of sensitive pattern hiding is important in privacy preserving data mining. Existing sensitive pattern hiding algorithms are originally designed for static database which cannot handle incremental datasets effectively and efficiently. To hide sensitive patterns in the incremental environment, a selection strategy for optimal victim items with minimal edge effect is designed based on sensitive pattern graph and a privacy preservation algorithm in the incremental updating database is proposed. The instance analysis and experimental results validate the correctness, efficiency and scalability of the proposed method.
[1] Verykios V S, Bertino E, Fovino I N, et al. State-of-the-Art in Privacy Preserving Data Mining. SIGMOD Record, 2004, 33(1): 50-57 [2] Oliveira S R M, Zaane O R. Privacy Preserving Frequent Itemset Mining // Proc of the IEEE International Conference on Privacy, Security and Data Mining. Honolulu, USA, 2002: 43-54 [3] Lee G, Chen Y C, Peng S L, et al. Solving the Sensitive Itemset Hiding Problem Whilst Minimizing Side Effects on a Sanitized Database // Proc of the 2nd International Conference on Security-Enriched Urban Computing and Smart Grids. Hualien, China, 2011: 104-113 [4] Byun J W, Li T C, Bertino E, et al. Privacy-Preserving Incremental Data Dissemination. Journal of Computer Security, 2009, 17(1): 43-68 [5] Xiao X K, Tao Y F. M-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets // Proc of the ACM SIGMOD International Conference on Management of Data. Beijing, China, 2007: 689-700 [6] He Y Y, Barman S, Naughton J F. Preventing Equivalence Attacks in Updated, Anonymized Data // Proc of the 27th IEEE International Conference on Data Engineering. Hannover, Germany, 2011: 529-540 [7] di Vimercati S D C, Foresti S, Livraga G, et al. Protecting Privacy in Data Release // Aldini A, Gorrieri R, eds. Foundations of Security Analysis and Design VI. Berlin, Germany: Springer-Verlag, 2011: 1-34 [8] Wang J L, Xu C F, Pan Y H. An Incremental Algorithm for Mining Privacy-Preserving Frequent Itemsets // Proc of the International Conference on Machine Learning and Cybernetics. Dalian, China, 2006: 1132-1137 [9] Dai B R, Chiang L H. Hiding Frequent Patterns in the Updated Database // Proc of the International Conference on Information Science and Applications. Seoul, Republic of Korea, 2010: 1-8 [10] Mhatre A, Toshniwal D. Hiding Co-occurring Sensitive Patterns in Progressive Databases // Proc of the EDBT/ICDT Workshops. Lausanne, Switzerland, 2010: 35 [11] Zhou B, Han Y, Pei J, et al. Continuous Privacy Preserving Publishing of Data Streams // Proc of the 12th International Conference on Extending Database Technology: Advances in Database Technology. Saint-Petersburg, Russia, 2009: 648-659 [12] Oliveira S R M, Zaane O R, Saygin Y. Secure Association Rule Sharing // Proc of the 8th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining. Sydney, Australia, 2004: 74-85 [13] Geurts K, Wets G, Brijs T, et al. Profiling of High Frequency Accident Locations Using Association Rules. Transportation Research Record: Journal of the Transportation Research Board, 2003, 1840(1): 123-130 [14] Kuo Y P, Lin P Y, Dai B R. Hiding Frequent Patterns under Multiple Sensitive Thresholds // Proc of the 19th International Conference on Database and Expert Systems Applications. Turin, Italy, 2008: 5-18