A Survey on Sensitive Association Rules Hiding Methods

2017 
In today's scenario of internet world, a cloud computing and data center, a lot of importance has to be given to the security of information while sharing it with different organizations. Present advance data mining techniques gives knowledge about various relationships of itemsets which will be useful to a group of people while enhancing their businesses. However, in many cases the organizations having the source of information may not intended to share such relationships (association rules) with any other organization or they wants to have rights of information. Therefore, there is a need to hide the sensitive information in the database prior to share it among in the organizations. The focus of this work is to understand the hiding methodologies of association rules in database while maintaining the disturbance in the original database as less as possible. However, intended recipients must receive this sensitive information robustly against various intentional or unintentional attacks.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    1
    Citations
    NaN
    KQI
    []