Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Mining frequent patterns without candidate generation
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Association Analysis with One Scan of Databases
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
IEEE Transactions on Knowledge and Data Engineering
Hiding collaborative recommendation association rules
Applied Intelligence
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
Privacy-Preserving Data Mining: Models and Algorithms
Privacy-Preserving Data Mining: Models and Algorithms
Hi-index | 0.00 |
In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to hide the Collaborative Recommendation Association Rules (CRAR) and to merge the (sanitized) data sets are introduced. Performance and various side effects of the proposed approaches are analyzed numerically. Comparisons of non-trusting and trusting third-party approach are reported. Numerical results show that the non-trusting third-party approach has better processing time, with similar side effects to the trusting third-party approach.