• Login
    View Item 
    •   IIMA Institutional Repository Home
    • Faculty Publications (Bibliographic)
    • Journal Articles
    • View Item
    •   IIMA Institutional Repository Home
    • Faculty Publications (Bibliographic)
    • Journal Articles
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A two-stage integer programming model considering transaction equivalence for privacy preservation

    Thumbnail
    View/Open
    A_two-stage_integer_programming_model_considering_transaction_equivalence_for_privacy_preservation.pdf (1.269Mb)
    Date
    2022-08-17
    Author
    Krishnamoorthy, Srikumar
    Metadata
    Show full item record
    Abstract
    Preserving privacy is one of the fundamental requirements of firms that share data with their business partners for building advanced data mining models. Firms often aim to protect the disclosure of sensitive knowledge or information discovered during the data mining process. In this study, we investigate the problem of Frequent Itemset Hiding (FIH) which aims to hide sensitive itemset relationships present in a transactional database. We propose a two-stage integer programming model that maximizes the proportion of unaltered transactions in the sanitized database and protects sensitive itemset relationships. The model exploits the concept of transactional equivalence and significantly reduces the size of the FIH problem. In addition, our model enables the identification of solutions with minimal side effects. We conduct an experimental evaluation on both real and synthetic databases to show that our approach is scalable and produces a sanitized database with maximum accuracy. The generated solution is also found to have lower side effects (itemset information loss) compared to other state-of-the-art methods. Our experiments on very large problem instances show problem size reductions of one to three orders of magnitude. The proposed approach is quite attractive and practically useful for solving large-scale FIH problem instances and preserving privacy in increasingly shared and big data-driven organizational environments.
    URI
    http://hdl.handle.net/11718/25802
    Collections
    • Journal Articles [3772]

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of IIMA Institutional RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Statistics

    View Usage Statistics

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV