2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7755148
|View full text |Cite
|
Sign up to set email alerts
|

Advance privacy preserving in association rule mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…However, a high level of privacy is vital to protecting sensitive information when it is shared by data owners for the association rule mining process. Privacy preservation is a data mining technique that addresses the security of the knowledge extracted through data mining methods [7]. Recently, researchers have shed light on the challenges of Privacy Preserving Association Rule Mining (PPARM) because of the dilemma of choosing between disclosing sensitive association rules to generate highly accurate results and maintaining the privacy of these sensitive rules.…”
Section: Introductionmentioning
confidence: 99%
“…However, a high level of privacy is vital to protecting sensitive information when it is shared by data owners for the association rule mining process. Privacy preservation is a data mining technique that addresses the security of the knowledge extracted through data mining methods [7]. Recently, researchers have shed light on the challenges of Privacy Preserving Association Rule Mining (PPARM) because of the dilemma of choosing between disclosing sensitive association rules to generate highly accurate results and maintaining the privacy of these sensitive rules.…”
Section: Introductionmentioning
confidence: 99%
“…Protocols for the GT problem can be used to determine graphics similarity [17]. SMC protocols of the GT problem were used to solve secure computation of skyline query in mapreduce [18], secure stable matching at scale [19], private large-scale databases [20], association rule mining [21], and so forth. In addition, Bogdanov et al [22] proposed a tool for cryptographically secure statistical analysis based on a sorting method.…”
Section: Introductionmentioning
confidence: 99%