Association Rule Hiding for Data Mining

Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which...

Full description

Bibliographic Details
Main Authors: Gkoulalas-Divanis, Aris. (Author), Verykios, Vassilios S. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Boston, MA : Springer US, 2010.
Series:Advances in Database Systems, 41
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4419-6569-1
LEADER 04055nam a22005775i 4500
001 9183
003 DE-He213
005 20130725200145.0
007 cr nn 008mamaa
008 100528s2010 xxu| s |||| 0|eng d
020 # # |a 9781441965691  |9 978-1-4419-6569-1 
024 7 # |a 10.1007/978-1-4419-6569-1  |2 doi 
050 # 4 |a QA76.9.D3 
072 # 7 |a UN  |2 bicssc 
072 # 7 |a UMT  |2 bicssc 
072 # 7 |a COM021000  |2 bisacsh 
082 0 4 |a 005.74  |2 23 
100 1 # |a Gkoulalas-Divanis, Aris.  |e author. 
245 1 0 |a Association Rule Hiding for Data Mining  |c by Aris Gkoulalas-Divanis, Vassilios S. Verykios.  |h [electronic resource] / 
264 # 1 |a Boston, MA :  |b Springer US,  |c 2010. 
300 # # |a XX, 138p. 120 illus., 60 illus. in color.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Advances in Database Systems,  |v 41  |x 1386-2944 ; 
505 0 # |a Part I Fundamental Concepts -- Introduction -- Background -- Classes of Association Rule Hiding Methodologies -- Other Knowledge Hiding Methodologies -- Part II Heuristic Approaches -- Distortion Schemes -- Blocking Schemes -- Part III Border Based Approaches -- Border Revision for Knowledge Hiding -- BBA Algorithm -- Max Min Algorithms -- Part IV Exact Hiding Approaches -- Menon s Algorithm -- Inline Algorithm -- Two Phase Iterative Algorithm -- Hybrid Algorithm -- Parallelization Framework for Exact Hiding -- Quantifying the Privacy of Exact Hiding Algorithms -- Part V Epilogue -- Conclusions -- Roadmap to Future Work -- References -- Index. 
520 # # |a Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which studies the problem of hiding sensitive association rules from within the data. Association Rule Hiding for Data Mining addresses the optimization problem of hiding sensitive association rules which due to its combinatorial nature admits a number of heuristic solutions that will be proposed and presented in this book. Exact solutions of increased time complexity that have been proposed recently are also presented as well as a number of computationally efficient (parallel) approaches that alleviate time complexity problems, along with a discussion regarding unsolved problems and future directions. Specific examples are provided throughout this book to help the reader study, assimilate and appreciate the important aspects of this challenging problem. Association Rule Hiding for Data Mining is designed for researchers, professors and advanced-level students in computer science studying privacy preserving data mining, association rule mining, and data mining. This book is also suitable for practitioners working in this industry. 
650 # 0 |a Computer science. 
650 # 0 |a Operating systems (Computers). 
650 # 0 |a Data structures (Computer science). 
650 # 0 |a Computer software. 
650 # 0 |a Database management. 
650 # 0 |a Information systems. 
650 # 0 |a Artificial intelligence. 
650 1 4 |a Computer Science. 
650 2 4 |a Database Management. 
650 2 4 |a Information Systems Applications (incl.Internet). 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Performance and Reliability. 
700 1 # |a Verykios, Vassilios S.  |e author. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781441965684 
830 # 0 |a Advances in Database Systems,  |v 41  |x 1386-2944 ; 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4419-6569-1 
912 # # |a ZDB-2-SCS 
950 # # |a Computer Science (Springer-11645)