Pufferfish: A framework for mathematical privacy definitions

D Kifer, A Machanavajjhala - ACM Transactions on Database Systems …, 2014 - dl.acm.org
In this article, we introduce a new and general privacy framework called Pufferfish. The
Pufferfish framework can be used to create new privacy definitions that are customized to the …

Data sanitization in association rule mining: An analytical review

A Telikani, A Shahbahrami - Expert Systems with Applications, 2018 - Elsevier
Association rule hiding is the process of transforming a transaction database into a sanitized
version to protect sensitive knowledge and patterns. The challenge is to minimize the side …

A rigorous and customizable framework for privacy

D Kifer, A Machanavajjhala - Proceedings of the 31st ACM SIGMOD …, 2012 - dl.acm.org
In this paper we introduce a new and general privacy framework called Pufferfish. The
Pufferfish framework can be used to create new privacy definitions that are customized to the …

Privacy preserving data mining framework for negative association rules: An application to healthcare informatics

SM Darwish, RM Essa, MA Osman, AA Ismail - IEEE Access, 2022 - ieeexplore.ieee.org
Protecting the privacy of healthcare information is an important part of encouraging data
custodians to give accurate records so that mining may proceed with confidence. The …

Association rule hiding methods

VS Verykios - Wiley Interdisciplinary Reviews: Data Mining and …, 2013 - Wiley Online Library
Privacy preserving data mining has been recently introduced to cope with privacy issues
related to the data subjects in the course of the mining of the data. It has also been …

Privacy preserving utility mining: a survey

W Gan, J Chun-Wei, HC Chao… - … Conference on Big …, 2018 - ieeexplore.ieee.org
In big data era, the collected data usually contains rich information and hidden knowledge.
Utility-oriented pattern mining and analytics have shown a powerful ability to explore these …

Exact knowledge hiding through database extension

A Gkoulalas-Divanis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we propose a novel, exact border-based approach that provides an optimal
solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original …

Privacy-preserving in association rule mining using an improved discrete binary artificial bee colony

A Telikani, AH Gandomi, A Shahbahrami… - Expert Systems with …, 2020 - Elsevier
Abstract Association Rule Hiding (ARH) is the process of protecting sensitive knowledge
using data transformation. Although there are some evolutionary-based ARH algorithms …

Association rule hiding in risk management for retail supply chain collaboration

HQ Le, S Arch-Int, HX Nguyen, N Arch-Int - Computers in Industry, 2013 - Elsevier
Association rule hiding is an efficient solution that helps enterprises avoid the risk caused by
sensitive knowledge leakage when sharing data in their collaborations. This study examines …

Efficient algorithms for victim item selection in privacy-preserving utility mining

S Jangra, D Toshniwal - Future Generation Computer Systems, 2022 - Elsevier
High-utility itemset mining has evolved as an essential and captivating research topic. It
aims to extract the patterns/itemsets having high utility value; hence, they are called high …