One of the obstacles in using data mining techniques such as association rules is the risk of leakage of sensitive data after the data is released to the public. Therefore, a trade-off between the data privacy and data mining is of a great importance and must be managed carefully. In this study an efficient algorithm is introduced for preserving the privacy of association rules according to distortion-based method, in which the sensitive association rules are hidden through deletion and reinsertion of items in the database. In this algorithm, in order to reduce the side effects on non-sensitive rules, the item correlation between sensitive and non-sensitive rules is calculated and the item with the minimum influence in non-sensitive rules i...
Data mining services require accurate input data for their results to be meaningful, but privacy con...
In the recent years, data mining has emerged as a very popular tool for extracting hidden knowledge ...
Abstract—Large repositories of data contain sensitive information that must be protected against una...
One of the obstacles in using data mining techniques such as association rules is the risk of leakag...
In the past few years, privacy issues in data mining have received considerable attention in the dat...
Privacy preservation data mining is novel research area where data mining algorithms are analyzed fo...
Privacy preserving data mining is a continues way for to use data mining, without disclosing private...
Association rule mining is a well-known data mining technique used for extracting hidden correlation...
[[abstract]]Data mining techniques have been widely used in various applications. However, the misus...
Abstract—Association rule mining is an efficient data mining technique that recognizes the frequent ...
Due to the rapid growth of data mining technology, obtaining private data on users through this tech...
Data mining provides the opportunity to extract useful information from large databases. Various tec...
The security of the large database that contains certain crucial information, it will become a serio...
Privacy preserving data mining (PPDM) is a novel research direction to preserve privacy for sensitiv...
The security of the large database that contains certain crucial information, it will become a serio...
Data mining services require accurate input data for their results to be meaningful, but privacy con...
In the recent years, data mining has emerged as a very popular tool for extracting hidden knowledge ...
Abstract—Large repositories of data contain sensitive information that must be protected against una...
One of the obstacles in using data mining techniques such as association rules is the risk of leakag...
In the past few years, privacy issues in data mining have received considerable attention in the dat...
Privacy preservation data mining is novel research area where data mining algorithms are analyzed fo...
Privacy preserving data mining is a continues way for to use data mining, without disclosing private...
Association rule mining is a well-known data mining technique used for extracting hidden correlation...
[[abstract]]Data mining techniques have been widely used in various applications. However, the misus...
Abstract—Association rule mining is an efficient data mining technique that recognizes the frequent ...
Due to the rapid growth of data mining technology, obtaining private data on users through this tech...
Data mining provides the opportunity to extract useful information from large databases. Various tec...
The security of the large database that contains certain crucial information, it will become a serio...
Privacy preserving data mining (PPDM) is a novel research direction to preserve privacy for sensitiv...
The security of the large database that contains certain crucial information, it will become a serio...
Data mining services require accurate input data for their results to be meaningful, but privacy con...
In the recent years, data mining has emerged as a very popular tool for extracting hidden knowledge ...
Abstract—Large repositories of data contain sensitive information that must be protected against una...