Keshavamurthy, Bettahally N. and Khan, Asad M and Toshniwal, Durga (2013) Privacy preserving association rule mining over distributed databases using genetic algorithm. Neural Computation and Applications, 22 (1). pp. 351-364. ISSN 1433-3058
![]() |
PDF
Springer paper.pdf - Published Version Restricted to Registered users only Download (1MB) | Request a copy |
Abstract
Privacy preservation in distributed database is an active area of research. With the advancement of technology, massive amounts of data are continuously being collected and stored in distributed database applications. Indeed, temporal associations and correlations among items in large transactional datasets of distributed database can help in many business decision-making processes. One among them is mining frequent itemset and computing their association rules, which is a nontrivial issue. In a typical situation, multiple parties may wish to collaborate for extracting interesting global information such as frequent association, without revealing their respective data to each other. This may be particularly useful in applications such as retail market basket analysis, medical research, academic, etc. In the proposed work, we aim to find frequent items and to develop a global association rules model based on the genetic algorithm (GA). The GA is used due to its inherent features like robustness with respect to local maxima/minima and domain-independent nature for large space search technique to find exact or approximate solutions for optimization and search problems. For privacy preservation of the data, the concept of trusted third party with two offsets has been used. The data are first anonymized at local party end, and then, the aggregation and global association is done by the trusted third party. The proposed algorithms address various types of partitions such as horizontal, vertical, and arbitrary.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Privacy preservation � Distributed databases � Genetic algorithm � Association rules mining � Trusted third-party computation |
Subjects: | Engineering > MIT Manipal > Information and Communication Technology |
Depositing User: | MIT Library |
Date Deposited: | 21 Aug 2013 04:06 |
Last Modified: | 21 Aug 2013 04:06 |
URI: | http://eprints.manipal.edu/id/eprint/136831 |
Actions (login required)
![]() |
View Item |