2010 KSupportAnonymitybasedonPseudoT
- (Tai et al., 2010) ⇒ Chih-Hua Tai, Philip S. Yu, and Ming-Syan Chen. (2010). “k-Support Anonymity based on Pseudo Taxonomy for Outsourcing of Frequent Itemset Mining.” In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2010). doi:10.1145/1835804.1835866
Subject Headings:
Notes
Cited By
- http://scholar.google.com/scholar?q=%22k-Support+anonymity+based+on+pseudo+taxonomy+for+outsourcing+of+frequent+itemset+mining%22+2010
- http://portal.acm.org/citation.cfm?id=1835866&preflayout=flat#citedby
Quotes
Author Keywords
Abstract
For any outsourcing service, privacy is a major concern. this paper focuses on outsourcing frequent itemset mining and examines the issue on how to protect privacy against the case where the attackers have precise knowledge on the supports of some items. We propose a new approach referred to as [math]\displaystyle{ k }[/math]-support anonymity to protect each sensitive item with [math]\displaystyle{ k }[/math]-1 other items of similar support. To achieve [math]\displaystyle{ k }[/math]-support anonymity, we introduce a pseudo taxonomy tree and have the third party mine the generalized frequent itemsets under the corresponding generalized association rules instead of association rules. The pseudo taxonomy is a construct to facilitate hiding of the original items, where each original item can map to either a leaf node or an internal node in the taxonomy tree. The rationale for this approach is that with a taxonomy tree, the [math]\displaystyle{ k }[/math] nodes to satisfy the [math]\displaystyle{ k }[/math]-support anonymity may be any [math]\displaystyle{ k }[/math] nodes in the taxonomy tree with the appropriate supports. So this approach can provide more candidates for [math]\displaystyle{ k }[/math]-support anonymity with limited fake items as only the leaf nodes, not the internal nodes, of the taxonomy tree need to appear in the transactions. Otherwise for the association rule mining, the [math]\displaystyle{ k }[/math] nodes to satisfy the [math]\displaystyle{ k }[/math]-support anonymity have to correspond to the leaf nodes in the taxonomy tree. This is far more restricted. The challenge is thus on how to generate the pseudo taxonomy tree to facilitate [math]\displaystyle{ k }[/math]-support anonymity and to ensure the conservation of original frequent itemsets. experimental results showed that our methods of k-support anonymity can achieve very good privacy protection with moderate storage overhead.
References
,
Author | volume | Date Value | title | type | journal | titleUrl | doi | note | year | |
---|---|---|---|---|---|---|---|---|---|---|
2010 KSupportAnonymitybasedonPseudoT | Philip S. Yu Chih-Hua Tai Ming-Syan Chen | k-Support Anonymity based on Pseudo Taxonomy for Outsourcing of Frequent Itemset Mining | KDD-2010 Proceedings | 10.1145/1835804.1835866 | 2010 |