Privacy Preservation of Periodic Frequent Patterns Using Sensitive Inverse Frequency

  • Chapter
  • First Online:
Periodic Pattern Mining

Abstract

Pattern mining methods help to extract valuable information from a large dataset. The extraction of knowledge might result in the risk of privacy issues. Some potential information might disclosure the insights about customers’ behaviors. This leads us to the issue of privacy-preserving data mining (PPDM) that hides sensitive information as much as possible but remains valid information for the further knowledge discovery methods. In this paper, we first propose a sanitization approach for hiding the sensitive periodic frequent patterns. The proposed method utilizes the Term Frequency and Inverse Document Frequency (TF-IDF) to select the transactions and items for sanitization based on the user-defined sensitive periodic frequent patterns. The designed approach can select the victim items in the transactional database for data sanitization. Experimental results showed that the model can perform better for sparse and dense datasets under different user-defined thresholds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://eur-lex.europa.eu/eli/reg/2016/679/oj.

References

  1. C.C. Aggarwal, J. Pei, B. Zhang, On privacy preservation against adversarial data mining, in ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 510–516 (2006)

    Google Scholar 

  2. U. Ahmed, G. Srivastava, J.C.W. Lin, A machine learning model for data sanitization. Comput. Netw. 189, 107914 (2021)

    Google Scholar 

  3. K. Amphawan, P. Lenca, A. Surarerks, Mining top-k periodic-frequent pattern from transactional databases without support threshold, in Advances in Information Technology, pp. 18–29 (2009)

    Google Scholar 

  4. K. Amphawan, A. Surarerks, P. Lenca, P, Mining periodic-frequent itemsets with approximate periodicity using interval transaction-ids list tree, in The International Conference on Knowledge Discovery and Data Mining, pp. 245–248 (2010)

    Google Scholar 

  5. C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, M.Y. Zhu, Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4(2), 28–34 (2002)

    Article  Google Scholar 

  6. M.N. Dehkordi, K. Badie, A.K. Zadeh, A novel method for privacy preserving in association rule mining based on genetic algorithms. J. Soft. 4(6), 555–562 (2009)

    Google Scholar 

  7. C. Dwork, F. McSherry, K. Nissim, A. Smith, Calibrating noise to sensitivity in private data analysis, in Theory of Cryptography Conference, pp. 265–284 (2006)

    Google Scholar 

  8. A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, Privacy preserving mining of association rules. Inf. Syst. 29(4), 343–364 (2004)

    Article  Google Scholar 

  9. P. Fournier-Viger, J.W. Lin, B. Vo, T. Truong, J. Zhang, H. Le, A survey of itemset mining. Wiley Interdiscip. Rev.: Data Min. Knowl. Discov. 7(4), e1207 (2017)

    Google Scholar 

  10. P. Fournier-Viger, J.C.W. Lin, Q.H. Dong, D.T. Lan, Phm: mining periodic high-utility itemsets, in Industrial Conference on Data Mining, pp. 64–79 (2016)

    Google Scholar 

  11. P. Fournier-Viger, C.W. Lin, Q.H. Duong, T.L. Dam, L. Ĺ evÄŤĂ­k, D. Uhrin, M. Voznak, Pfpm: discovering periodic frequent patterns with novel periodicity measures, in The Czech-China Scientific Conference (2017)

    Google Scholar 

  12. P. Fournier-Viger, J.C.W. Lin, A. Gomariz, T. Gueniche, A. Soltani, Z. Deng, H.T. Lam, The spmf open-source data mining library version 2, pp. 36–40 (2016)

    Google Scholar 

  13. P. Fournier-Viger, Y. Wang, P. Yang, J.C.W. Lin, U. Yun, R.U. Kiran, Tspin: mining top-k stable periodic patterns. Appl. Intell., 1–22 (2021)

    Google Scholar 

  14. P. Fournier-Viger, P. Yang, R.U. Kiran, S. Ventura, J.M. Luna, Mining local periodic patterns in a discrete sequence. Inf. Sci. 544, 519–548 (2021)

    Article  MathSciNet  Google Scholar 

  15. P. Fournier-Viger, P. Yang, Z. Li, J.C.W. Lin, R.U. Kiran, Discovering rare correlated periodic patterns in multiple sequences. Data Knowl. Eng. 126, 101733 (2020)

    Google Scholar 

  16. P. Fournier-Viger, P. Yang, J.C.W. Lin, R.U. Kiran, Discovering stable periodic-frequent patterns in transactional data, in The International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 230–244 (2019)

    Google Scholar 

  17. J. Han, J. Pei, Y. Yin, Mining frequent patterns without candidate generation, in ACM SIDMOD International Conference on Management of Data, pp. 1–12 (2000)

    Google Scholar 

  18. T.P. Hong, C.W.Y. Lin, K. Tung, S.L. Wang, Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4), 502–510 (2012)

    Article  Google Scholar 

  19. R.U. Kiran, M. Kitsuregawa, P.K. Reddy, Efficient discovery of periodic-frequent patterns in very large databases. J. Syst. Softw. 112, 110–121 (2016)

    Article  Google Scholar 

  20. R.U. Kiran, P.K. Reddy, Mining rare periodic-frequent patterns using multiple minimum supports, in ACM Bangalore Conference, pp. 1–8 (2010)

    Google Scholar 

  21. B.K. Pandya, U.K. Singh, K. Dixit, K. Bunkar, Effectiveness of multiplicative data perturbation for privacy preserving data mining. Int. J. Adv. Res. Comput. Sci. 5(6) (2014)

    Google Scholar 

  22. C.W. Lin, T.P. Hong, C.C. Chang, S.L. Wang, A greedy-based approach for hiding sensitive itemsets by transaction insertion. J. Inf. Hiding Multimed. Signal Process. 4(4), 201–227 (2013)

    Google Scholar 

  23. C.W. Lin, T.P. Hong, H.C. Hsu, Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014 (2014)

    Google Scholar 

  24. C.W. Lin, T.P. Hong, K.T. Yang, S.L. Wang, The ga-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210–230 (2015)

    Article  Google Scholar 

  25. C.W. Lin, Y. Zhang, B. Zhang, P. Fournier-Viger, Y. Djenouri, Hiding sensitive itemsets with multiple objective optimization. Soft. Comput. 23(4), 12779–12797 (2019)

    Article  Google Scholar 

  26. J.C.W. Lin, Q. Liu, P. Fournier Viger, T.P. Hong, M. Voznak, J. Zhan, A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1–18 (2016)

    Google Scholar 

  27. J.C.W. Lin, G. Srivastava, Y. Zhang, Y. Djenouri, M. Aloqaily, Privacy-preserving multiobjective sanitization model in 6g iot environments. IEEE Internet Things J. 8(7), 5340–5349 (2021)

    Article  Google Scholar 

  28. J.C.W. Lin, T.Y. Wu, P. Fournier-Viger, G. Lin, J. Zhan, M. Voznak, Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. Artif. Intell. 55, 269–284 (2016)

    Article  Google Scholar 

  29. Y. Lindell, B. Pinkas, Privacy preserving data mining, in Annual International Cryptology Conference, pp. 36–54 (2000)

    Google Scholar 

  30. P. Fournier-Viger, Z. Li, J.C.W. Lin, R.U. Kiran, H. Fujita, Efficient algorithms to identify periodic patterns in multiple sequences. Inform. Sci. 489, 205–226 (2019)

    Google Scholar 

  31. G. Salton, E.A. Fox, H. Wu, Extended boolean information retrieval. Commun. ACM 26, 1022–1036 (1983)

    Article  MathSciNet  Google Scholar 

  32. S.K. Tanbeer, C.F. Ahmed, B. Jeong, Y.K. Lee, Discovering periodic-frequent patterns in transactional databases, in Advances in Knowledge Discovery and Data Mining, pp. 242–253 (2009)

    Google Scholar 

  33. V.S. Verykios, E. Bertino, I.N. Fovino, L.P. Provenza, Y. Saygin, Y. Theodoridis, State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1), 50–57 (2004)

    Article  Google Scholar 

  34. T.Y. Wu, J.C.W. Lin, Y. Zhang, C.H. Chen, The grid-based swarm intelligence algorithm for privacy-preserving data mining. Appl. Sci. 9(4), 774 (2019)

    Article  Google Scholar 

  35. M.J. Zaki, Scalable algorithms for association mining. IEEE Trans. Knowl. Data Eng. 12(3), 372–389 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jerry Chun-Wei Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ahmed, U., Lin, J.CW., Fournier-Viger, P. (2021). Privacy Preservation of Periodic Frequent Patterns Using Sensitive Inverse Frequency. In: Kiran, R.U., Fournier-Viger, P., Luna, J.M., Lin, J.CW., Mondal, A. (eds) Periodic Pattern Mining . Springer, Singapore. https://doi.org/10.1007/978-981-16-3964-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3964-7_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3963-0

  • Online ISBN: 978-981-16-3964-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation