2010 KSupportAnonymitybasedonPseudoT

From GM-RKB
Jump to navigation Jump to search

Subject Headings:

Notes

Cited By

Quotes

Author Keywords

Abstract

For any outsourcing service, privacy is a major concern. this paper focuses on outsourcing frequent itemset mining and examines the issue on how to protect privacy against the case where the attackers have precise knowledge on the supports of some items. We propose a new approach referred to as [math]\displaystyle{ k }[/math]-support anonymity to protect each sensitive item with [math]\displaystyle{ k }[/math]-1 other items of similar support. To achieve [math]\displaystyle{ k }[/math]-support anonymity, we introduce a pseudo taxonomy tree and have the third party mine the generalized frequent itemsets under the corresponding generalized association rules instead of association rules. The pseudo taxonomy is a construct to facilitate hiding of the original items, where each original item can map to either a leaf node or an internal node in the taxonomy tree. The rationale for this approach is that with a taxonomy tree, the [math]\displaystyle{ k }[/math] nodes to satisfy the [math]\displaystyle{ k }[/math]-support anonymity may be any [math]\displaystyle{ k }[/math] nodes in the taxonomy tree with the appropriate supports. So this approach can provide more candidates for [math]\displaystyle{ k }[/math]-support anonymity with limited fake items as only the leaf nodes, not the internal nodes, of the taxonomy tree need to appear in the transactions. Otherwise for the association rule mining, the [math]\displaystyle{ k }[/math] nodes to satisfy the [math]\displaystyle{ k }[/math]-support anonymity have to correspond to the leaf nodes in the taxonomy tree. This is far more restricted. The challenge is thus on how to generate the pseudo taxonomy tree to facilitate [math]\displaystyle{ k }[/math]-support anonymity and to ensure the conservation of original frequent itemsets. experimental results showed that our methods of k-support anonymity can achieve very good privacy protection with moderate storage overhead.

References

,

 AuthorvolumeDate ValuetitletypejournaltitleUrldoinoteyear
2010 KSupportAnonymitybasedonPseudoTPhilip S. Yu
Chih-Hua Tai
Ming-Syan Chen
k-Support Anonymity based on Pseudo Taxonomy for Outsourcing of Frequent Itemset MiningKDD-2010 Proceedings10.1145/1835804.18358662010