“…Approaches for hiding sensitive association rules falls into categories like data distortion [35,24,25,29,20,36], Data Blocking [31], Border-Based [32,12], Data Reconstruction [14,9,40,15] and cryptography approaches [22,42]. Performance is a major concern with hiding association rules [21,26,28,27,44]. [42] presents a novel approach to hide sensitive rules with limited side effects.…”