Total views : 274

A Hybrid Algorithm based on Heuristic Method to Preserve Privacy in Association Rule Mining


  • Department of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran, Islamic Republic of
  • Department of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, India


By developing technology and competition in different fields, preserving sensitive data is considered as a problematic issue for users. As long as users do not need to share their data, they preserve them in different ways, such as encryption and hiding them in personal devices like cell phones and computers. When users find it necessary to share their personal data, privacy preserving data mining will help them. In the present study, we introduce two algorithms called ISSDD (Intelligent Selection of Sanitization in Dense Database) and ISSSD (Intelligent Selection of Sanitization in Sparse Database) to decrease side effects such as hiding failure, losing non-sensitive rules, making new rules and also hiding sensitive rules without any restriction in the number of items in the left and right hand. In the suggested algorithms distortion technique is used to hide sensitive rules by declining confidence-based and support-based of rules.


Hiding Sensitive Rules, Privacy Preserving Data Mining, Sensitive Pattern.

Full Text:

 |  (PDF views: 200)


  • Verykios VS, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y. State of the art in privacy preserving data mining, SIGMOD Rec. 2004; 33:50–7.
  • Atallah M, Bertino E, Elmagarmid A, Ibrahim M, Verykios V. Disclosure limitation of sensitive rules, Knowledge and Data Engineering Exchange (KDEX). 1999; 43:45–52.
  • Wang SL, Jafari A. Hiding sensitive predictive association rules. Systems, Man and Cybernetics. 2005; 1:164–9.
  • Wang SL, Parikh B, Jafari A. Hiding informative association rule sets. Expert Systems with Applications. 2007; 33:316– 23.
  • Modi CN, Rao UP, Patel DR., Maintaining privacy and data quality in privacy preserving association rule mining, Computing Communication And Networking Technologies. 2010; 32:1–6.
  • Shah K, Thakkar A, Ganatra A. Association rule hiding by heuristic approach to reduce side effects and hide multiple R.H.S. items. International Journal of Computer Applications. 2012; 45:1–7.
  • Domadiya NH, Rao UP. Hiding sensitive association rules to maintain privacy and data quality in database, Advance Computing Conference (IACC). 2012; 32:1306–10.
  • Jain YK, Yadav VK, Panday GS. An efficient association rule hiding algorithm for privacy preserving data mining, International Journal on Computer Science and Engineering. 2011; 3:2792–8.
  • Vijayarani S, Prabha MS. Association rule hiding using artificial bee colony algorithm, International Journal of Computer Applications. 2011; 33:41–7.
  • Oliveira SM, Za¨ıane OR. Algorithms for balancing privacy and knowledge discovery in association rule mining. Seventh International Database Engineering and Applications Symposium, 2003. Proceedings. 2003; 56:54– 63.
  • Duraiswamy K, Manjula D, Maheswari NA. New approach to sensitive rule hiding. Stud Comp Intell. 2008; 1:107–11.
  • Menon S, Sarkar S, Mukherjee S. Maximizing accuracy of shared databases when concealing sensitive patterns. Information System Research. 2005; 16:256–570.
  • Verykios VS, Pontikakis ED, Theodoridis Y, Chang L. Efficient algorithms for distortion and blocking techniques in association rule hiding, Distributed and Parallel Databases. 2007; 22:85–104.
  • Amiri A. Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems. 2007; 43:181–91.
  • Dehkordi MN, Badie K, Zadeh AK. A novel method for privacy preserving in association rule mining based on genetic algorithms. Journal of Software. 2009; 4:555–62.
  • Ramakrishnan M. Switch pattern encryption based WBAN security in an IOT environment. Indian Journal of Science and Technology. 2015; 8:67–98. DOI: 10.17485/ijst/2015/v8i34/85274.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.