[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration

  • Conference paper
  • First Online:
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Abstract

Sharing of data provides mutual benefits for collaborating organizations. Data mining techniques have allowed regimented discovery of knowledge from huge databases. Conversely, in the case of sharing the data with others, knowledge discovery raises the possibility of revealing the sensitive knowledge. The need of privacy prompted the growth of numerous privacy-preserving data mining techniques. In order to deal with privacy concerns, the database is to be transformed into another database in such a way that the sensitive knowledge is concealed. One subarea of privacy-preserving data mining, which got attention in retail businesses, is privacy-preserving association rule mining. A significant feature of privacy-preserving association rule mining is attaining a balance between privacy and precision, which is characteristically conflicting, and refining the one generally reduces the other one. In this paper, the problem has been planned in the perspective of protecting association rules which are sensitive by prudently amending the transactions of the database. To moderate the loss of non-sensitive association rules and to improve the quality of the transformed database, the proposed approach competently estimates the impact of an alteration to the database. The proposed method selects the transactions for alterations using the binary TLBO optimization technique during the concealing process. Experimental outcomes exhibit the efficiency of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. A. Amiri. Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems, 2007.

    Google Scholar 

  2. M.V.P. Chandra Sekhar Rao. Ch Aparna. Dr B Raveendra Babu. Dr A Damodaram. An improved multi-perceptron neural network model to classify software defects. International Journal on Computer Science and Information Security (IJCSIS), 2011.

    Google Scholar 

  3. V S Verkios. E Bertino. L P Provenza. Y Saygin. E. Dasseni. Association rule hiding. IEEE Transactions on on Knowledge and Data Engineering, 2004.

    Google Scholar 

  4. Agrawal R Gehrke. J Evfimievski. A, Srikant.R. Privacy preserving mining of association rules. In: Proceedings of SIGKDD Conference, 2002.

    Google Scholar 

  5. Yang Kuo-Tung Wang Shyue-Liang Hong Tzung-Pei, Lin Chun-Wei. Using tf-idf to hide sensitive itemsets. Applied Intelligence, 2013.

    Google Scholar 

  6. Le Hai Quoc. Arch int Sojit. Nguyen Huy Xuan. Association rule hiding in risk management for retail supply chain collaboration. Computer in Industry, 2013.

    Google Scholar 

  7. J Bonam. A R Reddy. G Kalyani. Privacy preserving in association rule mining by data distortion using pso. Proc, ICT Critical Infrastruct., 2014.

    Google Scholar 

  8. R Venkata Rao. Review of applications of tlbo algorithm and a tutorial for beginners to solve the unconstrained and constrained optimization problems. Decision Science Letters, GrowingScience, 2016.

    Google Scholar 

  9. R V Rao. V J Savsani. Teacher learning-basd optimization: a novel method for constrained mechanical design opttimization problems. Comput. Aided Des., 2011.

    Google Scholar 

  10. Xun Yi, Fang-Yu Rao, Elisa Bertino, and Athman Bouguettaya. Privacy-preserving association rule mining in cloud computing. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security., 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Kalyani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kalyani, G., Chandra Sekhara Rao, M.V.P., Janakiramaiah, B. (2017). Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics