A Constraint-Based Model for the Frequent Itemset Hiding Problem

Vassilios S. Verykios, Elias C. Stavropoulos*, Vasilis Zorkadis, Ahmed K. Elmagarmid

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

This paper introduces a novel constraint-based hiding model to drastically reduce the preprocessing overhead that is incurred by border-based techniques in the hiding of sensitive frequent itemsets. The proposed model is solved by an efficient constraint-based mining algorithm that pushes a conjunction of antimonotone constraints into an Apriori-like algorithm, for inducing the support theory of non-sensitive frequent itemsets along with its negative border. The patterns induced by the constraint-based mining algorithm can be used in border-based hiding algorithms to construct a sanitized version of the original database, where the sensitive knowledge is concealed. The efficiency of the constraint-based mining algorithm is evaluated on real and synthetic datasets.

Original languageEnglish
Title of host publicationE-Democracy – Safeguarding Democracy and Human Rights in the Digital Age - 8th International Conference, e-Democracy 2019, Proceedings
EditorsSokratis Katsikas, Sokratis Katsikas, Vasilios Zorkadis
PublisherSpringer
Pages49-64
Number of pages16
ISBN (Print)9783030375447
DOIs
Publication statusPublished - 2020
Event8th e-Democracy International Conference on Safeguarding Democracy and Human Rights in the Digital Age, e-Democracy 2019 - Athens, Greece
Duration: 12 Dec 201913 Dec 2019

Publication series

NameCommunications in Computer and Information Science
Volume1111 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference8th e-Democracy International Conference on Safeguarding Democracy and Human Rights in the Digital Age, e-Democracy 2019
Country/TerritoryGreece
CityAthens
Period12/12/1913/12/19

Keywords

  • Constraint-based data mining
  • Frequent itemset hiding
  • Knowledge hiding
  • Linear programming
  • Privacy Preserving Data Mining

Fingerprint

Dive into the research topics of 'A Constraint-Based Model for the Frequent Itemset Hiding Problem'. Together they form a unique fingerprint.

Cite this