Association Rule Hiding Methods

Author(s):  
Vassilios S. Verykios

The enormous expansion of data collection and storage facilities has created an unprecedented increase in the need for data analysis and processing power. Data mining has long been the catalyst for automated and sophisticated data analysis and interrogation. Recent advances in data mining and knowledge discovery have generated controversial impact in both scientific and technological arenas. On the one hand, data mining is capable of analyzing vast amounts of information within a minimum amount of time, an analysis that has exceeded the expectations of even the most imaginative scientists of the last decade. On the other hand, the excessive processing power of intelligent algorithms which is brought with this new research area puts at risk sensitive and confidential information that resides in large and distributed data stores. Privacy and security risks arising from the use of data mining techniques have been first investigated in an early paper by O’ Leary (1991). Clifton & Marks (1996) were the first to propose possible remedies to the protection of sensitive data and sensitive knowledge from the use of data mining. In particular, they suggested a variety of ways like the use of controlled access to the data, fuzzification of the data, elimination of unnecessary groupings in the data, data augmentation, as well as data auditing. A subsequent paper by Clifton (2000) made concrete early results in the area by demonstrating an interesting approach for privacy protection that relies on sampling. A main result of Clifton’s paper was to show how to determine the right sample size of the public data (data to be disclosed to the public where sensitive information has been trimmed off), by estimating at the same time the error that is introduced from the sampling to the significance of the rules. Agrawal and Srikant (2000) were the first to establish a new research area, the privacy preserving data mining, which had as its goal to consider privacy and confidentiality issues originating in the mining of the data. The authors proposed an approach known as data perturbation that relies on disclosing a modified database with noisy data instead of the original database. The modified database could produce very similar patterns with those of the original database.

2009 ◽  
pp. 2268-2274
Author(s):  
Vassilios S. Verykios

The enormous expansion of data collection and storage facilities has created an unprecedented increase in the need for data analysis and processing power. Data mining has long been the catalyst for automated and sophisticated data analysis and interrogation. Recent advances in data mining and knowledge discovery have generated controversial impact in both scientific and technological arenas. On the one hand, data mining is capable of analyzing vast amounts of information within a minimum amount of time, an analysis that has exceeded the expectations of even the most imaginative scientists of the last decade. On the other hand, the excessive processing power of intelligent algorithms which is brought with this new research area puts at risk sensitive and confidential information that resides in large and distributed data stores.


Author(s):  
Güney Gürsel

Data mining has great contributions to the healthcare such as support for effective treatment, healthcare management, customer relation management, fraud and abuse detection and decision making. The common data mining methods used in healthcare are Artificial Neural Network, Decision trees, Genetic Algorithms, Nearest neighbor method, Logistic regression, Fuzzy logic, Fuzzy based Neural Networks, Bayesian Networks and Support Vector Machines. The most used task is classification. Because of the complexity and toughness of medical domain, data mining is not an easy task to accomplish. In addition, privacy and security of patient data is a big issue to deal with because of the sensitivity of healthcare data. There exist additional serious challenges. This chapter is a descriptive study aimed to provide an acquaintance to data mining and its usage and applications in healthcare domain. The use of Data mining in healthcare informatics and challenges will be examined.


2014 ◽  
Vol 23 (05) ◽  
pp. 1450004 ◽  
Author(s):  
Ibrahim S. Alwatban ◽  
Ahmed Z. Emam

In recent years, a new research area known as privacy preserving data mining (PPDM) has emerged and captured the attention of many researchers interested in preventing the privacy violations that may occur during data mining. In this paper, we provide a review of studies on PPDM in the context of association rules (PPARM). This paper systematically defines the scope of this survey and determines the PPARM models. The problems of each model are formally described, and we discuss the relevant approaches, techniques and algorithms that have been proposed in the literature. A profile of each model and the accompanying algorithms are provided with a comparison of the PPARM models.


Author(s):  
Weng-Kun Liu ◽  
Chia-Chun Yen

With the advances in industry and commerce, passengers have become more accepting of environmental sustainability issues; thus, more people now choose to travel by bus. Government administration constitutes an important part of bus transportation services as the government gives the right-of-way to transportation companies allowing them to provide services. When these services are of poor quality, passengers may lodge complaints. The increase in consumer awareness and developments in wireless communication technologies have made it possible for passengers to easily and immediately submit complaints about transportation companies to government institutions, which has brought drastic changes to the supply-demand chain comprised of the public sector, transportation companies, and passengers. This study proposed the use of big data analysis technology including systematized case assignment and data visualization to improve management processes in the public sector and optimize customer complaint services. Taichung City, Taiwan was selected as the research area. There, the customer complaint management process in public sector was improved, effectively solving such issues as station-skipping, allowing the public sector to fully grasp the service level of transportation companies, improving the sustainability of bus operations, and supporting the sustainable development of the public sector-transportation company-passenger supply chain.


Author(s):  
Yehuda Lindell

The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual’s need and right to privacy. Privacy preserving data mining solutions achieve the somewhat paradoxical property of enabling a data mining algorithm to use data without ever actually “seeing” it. Thus, the benefits of data mining can be enjoyed, without compromising the privacy of concerned individuals.


2017 ◽  
pp. 90-95
Author(s):  
Д.С. ШИБАЕВ ◽  
В.В. ВЫЧУЖАНИН ◽  
Н.О. ШИБАЕВА

The ideological basis of the study is to analyze the data obtained in the result of a large number of high-tech equipment. The data is distributed in databases, depending on various characteristics. The complexity of the sub-sequent processing depends on the amount of information you need to perform, as well as architectural type of data storage. The use of data mining technology allows to significantly improve the analysis of information and subsequent short-term search value. The use of this technology will improve the efficiency of the archives of marine indicators for all time of operation of the vessel. The technology of data analysis is not  tho-rough and requires permanent modification to increase their own efficiency. The addition of modern architecture through data in the databases, will allow to increase efficiency of data analysis, consisting of a large number of indicators of the condition of the vessel and its equipment. One of these    architectures is Map-Reduce.


2021 ◽  
Vol 14(63) (1) ◽  
pp. 122-136
Author(s):  
Maria Magdalena POPESCU ◽  

Fake News and Deepfakes have lately been highlighted in informative videos, research papers and literature reviews as tools for disinformation, along with filter bubble and echo chamber, polarization and mistrust. To counteract the unconventional weapons of word and imagery, a new research area has been defined as cognition security, a transdisciplinary area to understand the threats hybrid wars currently make use of and to determine the proper measures against non-kinetic offensives. For this, data mining and deep analysis are performed with digital instruments in a cognitive security system. Defined by all these, the present paper deconstructs the terms in an experimental monitoring of the media, to connect the realm of Cognition Security to its instruments in Cognitive Security Key words: Fake news, deepfake, cognitive security, narrat


Author(s):  
Yehida Lindell

The increasing use of data-mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual’s need and right to privacy. Privacy-preserving data-mining solutions achieve the somewhat paradoxical property of enabling a data-mining algorithm to use data without ever actually seeing it. Thus, the benefits of data mining can be enjoyed without compromising the privacy of concerned individuals.


2020 ◽  
pp. 50-73
Author(s):  
Güney Gürsel

Data mining has great contributions to the healthcare such as support for effective treatment, healthcare management, customer relation management, fraud and abuse detection and decision making. The common data mining methods used in healthcare are Artificial Neural Network, Decision trees, Genetic Algorithms, Nearest neighbor method, Logistic regression, Fuzzy logic, Fuzzy based Neural Networks, Bayesian Networks and Support Vector Machines. The most used task is classification. Because of the complexity and toughness of medical domain, data mining is not an easy task to accomplish. In addition, privacy and security of patient data is a big issue to deal with because of the sensitivity of healthcare data. There exist additional serious challenges. This chapter is a descriptive study aimed to provide an acquaintance to data mining and its usage and applications in healthcare domain. The use of Data mining in healthcare informatics and challenges will be examined.


2014 ◽  
Vol 33 (3) ◽  
pp. 53-65
Author(s):  
Vladimiras Gražulis ◽  
Elzbieta Markuckiene

During the past decade the interest of scientists in multiculturalism has increased significantly, as the need for the development of intercultural competency has become more explicitly manifested in the work environment of organizations. In Lithuania the analysis of intercultural competency is still quite a new research area and is conducted intermittently, i.e. only certain aspects related to intercultural competency are analysed. This article analyses various scientific approaches to the phenomenon of interculturalism and tendencies of its manifestation in the organizational environment. The authors present an empirical research which involved nearly half a thousand respondents (N=464) from the capital public institutions and small municipalities of Lithuania employees who work primarily in the public sector. The survey questionnaire allows to assess skills of intercultural competency, the geography and frequency of intercultural communication, dimensions of competencies of employees in Lithuanian organizations, etc. and to establish the problems characteristic of the competency development. Based on the obtained data the authors of the article establish the problems characteristic of the development of intercultural competence in Lithuanian organizations and provide an overview of future perspectives.


Sign in / Sign up

Export Citation Format

Share Document