{"title":"基于块的分类规则隐藏方法保护数据库隐私","authors":"Anita A. Parmar, U. P. Rao, D. Patel","doi":"10.1109/ISCCS.2011.103","DOIUrl":null,"url":null,"abstract":"Now-a-days it is common to share data between two organizations in many application areas. When data are to be shared between parties, there could be some sensitive patterns which should not be disclosed to the other parties. We address such the problem of sensitive classification rule hiding. We propose a blocking based approach for sensitive classification rule hiding. First we find the supporting transactions of sensitive rules. Then we replace known values with unknown values (\"?\") in those transactions to hide a given sensitive classification rule. Finally the sanitized dataset is generated from which sensitive classification rules are no longer mined. We also discuss experimental results of our algorithm.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"35","resultStr":"{\"title\":\"Blocking Based Approach for Classification Rule Hiding to Preserve the Privacy in Database\",\"authors\":\"Anita A. Parmar, U. P. Rao, D. Patel\",\"doi\":\"10.1109/ISCCS.2011.103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now-a-days it is common to share data between two organizations in many application areas. When data are to be shared between parties, there could be some sensitive patterns which should not be disclosed to the other parties. We address such the problem of sensitive classification rule hiding. We propose a blocking based approach for sensitive classification rule hiding. First we find the supporting transactions of sensitive rules. Then we replace known values with unknown values (\\\"?\\\") in those transactions to hide a given sensitive classification rule. Finally the sanitized dataset is generated from which sensitive classification rules are no longer mined. We also discuss experimental results of our algorithm.\",\"PeriodicalId\":326328,\"journal\":{\"name\":\"2011 International Symposium on Computer Science and Society\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"35\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Symposium on Computer Science and Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCCS.2011.103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Symposium on Computer Science and Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCCS.2011.103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Blocking Based Approach for Classification Rule Hiding to Preserve the Privacy in Database
Now-a-days it is common to share data between two organizations in many application areas. When data are to be shared between parties, there could be some sensitive patterns which should not be disclosed to the other parties. We address such the problem of sensitive classification rule hiding. We propose a blocking based approach for sensitive classification rule hiding. First we find the supporting transactions of sensitive rules. Then we replace known values with unknown values ("?") in those transactions to hide a given sensitive classification rule. Finally the sanitized dataset is generated from which sensitive classification rules are no longer mined. We also discuss experimental results of our algorithm.