期刊文献+

关联规则隐藏的事务增减方法 被引量:1

Approach of Transaction Adding and Removing for Association Rule Hiding
下载PDF
导出
摘要 基于事务对关联规则的贡献程度,提出一种新的敏感规则隐藏算法,包括添加弱相关事务和移除强相关事务2个过程。针对简单型和复合型单一规则,设计4种项目调整方法。实验表明,直接替换法的副作用最小,且只需少量事务更新就能达到要求。算法能抵抗大范围的支持度攻击,当调整因子达到0.07以上时,隐藏率为100%。 A new sensitive rule hiding algorithm,including two processes of Weak Association Transaction(WAT) and Strong Association Transaction(SAT),is presented based on the devotion degree of transactions to the mined association rules.For the two types of simple rules and composed rules,four item modification methods are designed for the updating of selected WATs.Experiments demonstrate that the direct substitution method has smallest side effect, and only a few transactions are required in data updating to hide the rule successfully. The robustness to the support attack is satisfying with suitable hiding rate. When the modification factor is set above 0.07, the hiding rate can always be 100% in rule detection process.
作者 张晓明 乔溪
出处 《计算机工程》 CAS CSCD 北大核心 2009年第20期41-43,共3页 Computer Engineering
基金 北京市教委科技发展计划面上基金资助项目(KM200510017006)
关键词 关联规则隐藏 事务增减 数据挖掘 支持度攻击 association rule hiding transaction adding and removing data mining support attack
  • 相关文献

参考文献5

  • 1Saygin Y. Using Unknowns to Prevent Discovery of Association Rules[C]//Proc. of Workshop on Research Issues in Data Engi- neering. San Jose, CA, USA: [s, n.], 2002.
  • 2Verykios V S. Association Rule Hiding[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(4): 434-447.
  • 3Dasseni E, Verykios V S, Elmagarmid A K, et al. Hiding Association Rules by Using Confidence and Support[C}//Proc. of the 4th Information Hiding Workshop. Pittsburgh, PA, USA: [s. n.], 2001.
  • 4Wu Yi-hung, Chiang Chia-ming, Chen A P. Hiding Sensitive Association Rules with Limited Side Effects[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(1): 29-41.
  • 5Zhang Xiaoming. Knowledge Hiding in Data Mining by Transaction Adding and Removing[C]//Proceedings of COMPSAC'07. Beijing, China: [s. n.], 2007.

同被引文献7

  • 1张鹏,童云海,唐世渭,杨冬青,马秀莉.一种有效的隐私保护关联规则挖掘方法[J].软件学报,2006,17(8):1764-1774. 被引量:53
  • 2Atallah M,Bertino E,Elmagarmid A,et al.Disclosure Limitation of Sensitive Rules[C] //Proc.of IEEE Knowledge and Data Engineering Workshop.Chicago,USA:[s.n.] ,1999.
  • 3Saygin Y.Using Unknowns to Prevent Discovery of Association Rules[C] //Proc.of Workshop on Research Issues in Data Engineering.San Jose,CA,USA:[s.n.] ,2002.
  • 4Dasseni E,Verykios V S,Elmagarmid A M,et al.Hiding Association Rules by Using Confidence and Support[C] //Proc.of IHW'01.Berlin,Germany:Springer-Verlag,2001.
  • 5Oliveira S R M,ZaTane O R.A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration[J].International Journal of Business Intelligence and Data Mining,2006,1(3):247-257.
  • 6Han J W Kamber M 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版杜,2001.147-158.
  • 7李霞,陈子军,吕庆春.基于移项的隐私保护关联规则挖掘算法[J].计算机工程,2009,35(12):59-60. 被引量:3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部