2019
DOI: 10.1016/j.cose.2019.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…For the reconstruction-based method, the dataset is reconstructed by a certain method and then released to the public [20][21][22] . By database reconstruction-based technologies, a data publisher can release the dataset for privacy-preserving mining association rules.…”
Section: Perturbation-based Data Publicationmentioning
confidence: 99%
See 1 more Smart Citation
“…For the reconstruction-based method, the dataset is reconstructed by a certain method and then released to the public [20][21][22] . By database reconstruction-based technologies, a data publisher can release the dataset for privacy-preserving mining association rules.…”
Section: Perturbation-based Data Publicationmentioning
confidence: 99%
“…By database reconstruction-based technologies, a data publisher can release the dataset for privacy-preserving mining association rules. The reason lies that a published dataset can be partially or fully synthetic based on the requirements of hiding SARs while guaranteeing the utility of the dataset [22] . The kind of methods are interesting and are worth investigating for further researches about the minable data publication.…”
Section: Perturbation-based Data Publicationmentioning
confidence: 99%
“…Frequency estimation is a classic use case for privacy protection since analytics translate observations into the frequency of relevant attributes. Such statistical translation helps find relevant behavior such as the heavy hitters (Ben Basat et al 2020;Pekar et al 2021;Wang et al 2021b;Zhao et al 2022), frequent items (Luna et al 2019;Wang et al 2018a;Djenouri et al 2018Djenouri et al , 2019Rouane et al 2019;Li et al 2019), or finding the marginals (Zhang et al 2018;Cormode et al 2018;Xue et al 2021;Wang et al 2019a, b, c). While individuals who comprise the records require plausible deniability from participation in the record, the statistical values should not deviate to extremes.…”
Section: Literature Surveymentioning
confidence: 99%
“…Pang et al [15] devised a sensitive association rule hiding algorithm on outsourced data uploaded from multiple data owners in a twin cloud architecture using homomorphic cryptosystem. Shaoxin et al [16] proposed a database reconstruction-based technique for hiding frequent itemsets achieves a high degree of privacy and reasonable data utility of the synthetic database. The main drawback of the heuristic approach is that in the majority of cases, it fails to deliver an optimal solution to the sanitization problem.…”
Section: Related Workmentioning
confidence: 99%