Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Efficiently mining long patterns from databases
SIGMOD '98 Proceedings of the 1998 ACM SIGMOD international conference on Management of data
A new and versatile method for association generation
Information Systems
Mining frequent patterns without candidate generation
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Real world performance of association rule algorithms
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Probabilistic query expansion using query logs
Proceedings of the 11th international conference on World Wide Web
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Scalable Algorithms for Association Mining
IEEE Transactions on Knowledge and Data Engineering
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
An Efficient Algorithm for Mining Association Rules in Large Databases
VLDB '95 Proceedings of the 21th International Conference on Very Large Data Bases
Mining Generalized Association Rules
VLDB '95 Proceedings of the 21th International Conference on Very Large Data Bases
Hiding Association Rules by Using Confidence and Support
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
IEEE Transactions on Knowledge and Data Engineering
The complexity of mining maximal frequent itemsets and maximal frequent patterns
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Hiding Sensitive Association Rules with Limited Side Effects
IEEE Transactions on Knowledge and Data Engineering
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Why we search: visualizing and predicting user behavior
Proceedings of the 16th international conference on World Wide Web
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Anonymizing transaction databases for publication
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
A framework for efficient data anonymization under privacy and accuracy constraints
ACM Transactions on Database Systems (TODS)
On the Anonymization of Sparse High-Dimensional Data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
FF-Anonymity: When Quasi-identifiers Are Missing
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
PCTA: privacy-constrained clustering-based transaction data anonymization
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Revisiting sequential pattern hiding to enhance utility
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
Privacy preservation by disassociation
Proceedings of the VLDB Endowment
Anonymizing set-valued data by nonreciprocal recoding
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
On differentially private frequent itemset mining
Proceedings of the VLDB Endowment
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
The publication of transaction data, such as market basket data, medical records, and query logs, serves the public benefit. Mining such data allows for the derivation of association rules that connect certain items to others with measurable confidence. Still, this type of data analysis poses a privacy threat; an adversary having partial information on a person's behavior may confidently associate that person to an item deemed to be sensitive. Ideally, an anonymization of such data should lead to an inference-proof version that prevents the association of individuals to sensitive items, while otherwise allowing for truthful associations to be derived. Original approaches to this problem were based on value perturbation, damaging data integrity. Recently, value generalization has been proposed as an alternative; still, approaches based on it have assumed either that all items are equally sensitive, or that some are sensitive and can be known to an adversary only by association, while others are non-sensitive and can be known directly. Yet in reality there is a distinction between sensitive and non-sensitive items, but an adversary may possess information on any of them. Most critically, no antecedent method aims at a clear inference-proof privacy guarantee. In this paper, we propose ρ-uncertainty, the first, to our knowledge, privacy concept that inherently safeguards against sensitive associations without constraining the nature of an adversary's knowledge and without falsifying data. The problem of achieving ρ-uncertainty with low information loss is challenging because it is natural. A trivial solution is to suppress all sensitive items. We develop more sophisticated schemes. In a broad experimental study, we show that the problem is solved non-trivially by a technique that combines generalization and suppression, which also achieves favorable results compared to a baseline perturbation-based scheme.