TY - GEN
T1 - K-anonymous association rule hiding
AU - Zhu, Zutao
AU - Du, Wenliang
PY - 2010
Y1 - 2010
N2 - In the paper we point out that the released dataset of an association rule hiding method may have severe privacy problem since they all achieve to minimize the side effects on the original dataset. We show that an attacker can discover the hidden sensitive association rules with high confidence when there is not enough "blindage". We give a detailed analysis of the attack and propose a novel association rule hiding metric, K-anonymous. Based on the K-anonymous metric, we present a framework to hide a group of sensitive association rules while it is guaranteed that the hidden rules are mixed with at least other K-1 rules in the specific region. Several heuristic algorithms are proposed to achieve the hiding process. Experiment results are reported to show the effectiveness and efficiency of the proposed approaches.
AB - In the paper we point out that the released dataset of an association rule hiding method may have severe privacy problem since they all achieve to minimize the side effects on the original dataset. We show that an attacker can discover the hidden sensitive association rules with high confidence when there is not enough "blindage". We give a detailed analysis of the attack and propose a novel association rule hiding metric, K-anonymous. Based on the K-anonymous metric, we present a framework to hide a group of sensitive association rules while it is guaranteed that the hidden rules are mixed with at least other K-1 rules in the specific region. Several heuristic algorithms are proposed to achieve the hiding process. Experiment results are reported to show the effectiveness and efficiency of the proposed approaches.
KW - association rule hiding
KW - k-anonymity
UR - http://www.scopus.com/inward/record.url?scp=77954488524&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954488524&partnerID=8YFLogxK
U2 - 10.1145/1755688.1755726
DO - 10.1145/1755688.1755726
M3 - Conference contribution
AN - SCOPUS:77954488524
SN - 9781605589367
T3 - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
SP - 305
EP - 309
BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
T2 - 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Y2 - 13 April 2010 through 16 April 2010
ER -