<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Privacy Preserving Association Rule Mining Using Perturbation Technique</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Tobi</forename><forename type="middle">Deborah</forename><surname>Omoyele</surname></persName>
							<email>omoyeletobi@yahoo.com</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Ibadan</orgName>
								<address>
									<settlement>Ibadan</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Solomon</forename><forename type="middle">Olalekan</forename><surname>Akinola</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Ibadan</orgName>
								<address>
									<settlement>Ibadan</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Privacy Preserving Association Rule Mining Using Perturbation Technique</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">6927A679FDD5E33CC0EC519F0C793EF8</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Data Perturbation</term>
					<term>Data Mining</term>
					<term>Data Privacy</term>
					<term>Randomization</term>
					<term>Association rule mining</term>
					<term>Summarization</term>
					<term>Suppression</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The information age has enabled organizations to gather large volumes of data. However, the usefulness of this data is negligible if "meaningful information" cannot be extracted from it. Data mining answers this need. The problem of privacy-preserving data mining has become important recently because of the increasing ability to store personal data and the sophistication of data mining algorithms to leverage information. Many researches have been done in this field but few with quantitative data had drawbacks of high number of rules generated and few number of item hidden. This study, proposes a perturbation association rules hiding algorithm for privacy of quantitative data to provide a better algorithm for preserving quantitative data. In hiding of rules, the noise associated with each item was calculated. The noise was used to calculate the support and confidence of rules which were then compared with minimum support and confidence. Item whose support/confidence is less than or equal to minimum support or confidence would be hidden. Experimental result shows that the algorithm hides more rules than the existing works.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>The information age has enabled many organizations to gather large volumes of data. However, the usefulness of this data is negligible if "meaningful information" or "knowledge" cannot be extracted from it. Data mining attempts to answer this need. Data mining is an iterative process within which progress is defined by discovery, prediction or classification of data through either automatic or manual methods. It is most useful in scenarios in which there are no predetermined notions about what will constitute an interesting outcome and it also involve the search for new, valuable and nontrivial information in large volumes of data but the potential danger is privacy concerns of sensitive data <ref type="bibr" target="#b1">[1]</ref>. The objective of privacy preserving data mining is to hide sensitive information so that they cannot be discovered through data mining techniques. Privacy preserving data mining (PPDM) refers to the area of data mining that seeks to safeguard sensitive information from unsolicited disclosure <ref type="bibr" target="#b2">[2]</ref>. Most traditional data mining techniques analyze and model the dataset statistically, while privacy preservation is primarily concerned with protecting against disclosure of individual data records.</p><p>The term "privacy preserving data mining" was introduced in papers Rakesh and Ramakrishna <ref type="bibr" target="#b3">[3]</ref> and Lindell and Pinkas <ref type="bibr" target="#b4">[4]</ref>. These papers considered two fundamental problems of privacy preservation in data mining, privacy preserving in data collection and mining a dataset partitioned across several private enterprises. Rakesh and Ramakrishna <ref type="bibr" target="#b3">[3]</ref> devised a randomization algorithm that allows a large number of users to contribute their private records for efficient centralized data mining while limiting the disclosure of their values, Lindell and Pinkas <ref type="bibr" target="#b4">[4]</ref> invented a cryptographic protocol for decision tree construction over a dataset horizontally partitioned between two parties.</p><p>A number of techniques such as randomization, suppression, summarization, association rule, perturbation, cryptography and kanonymity have been suggested in recent years according to survey carried out by Alexandre <ref type="bibr" target="#b5">[5]</ref> in order to perform privacypreserving data mining.</p><p>Ila <ref type="bibr" target="#b6">[6]</ref> proposed an algorithm for privacy preservation of data mining in which he assumed that only sensitive data items can be found in the database. The proposed algorithm modified data in the database such that sensitive item can either be at the left hand side or right hand side of the rule and cannot be inferred through association rule mining algorithms. For the algorithm to hide sensitive item either the support or confidence is decreased to be smaller than pre-specified minimum support and minimum confidence.</p><p>Most of the studies carried out in this research are concentrated on hiding binary database which are only concerned with the presence or absence of item but in reality most real applications consists of quantitative values. For instance, many people have the problem of sugar, but this does not mean that one is sick or not, the only criterion that can be use to for determine the illness is the surplus/deficiency in sugar's quantity.</p><p>The problem of mining quantitative association rule was first introduced by Evfimievski et al <ref type="bibr" target="#b7">[7]</ref>. Two works have been done in the field of hiding fuzzy association rule in quantitative data according to Manoj and Joshi <ref type="bibr">[8]</ref> and Berberoglu <ref type="bibr" target="#b9">[9]</ref>. However, little or no work has been done in the aspect of perturbation of association rules for quantitative data using the concept of noise. Manoj and Joshi <ref type="bibr">[8]</ref> proposed a hiding algorithm that integrates the fuzzy set concepts and Apriori mining algorithm to find useful fuzzy association rules from a quantitative database and then hide them using privacy preserving technique. Unlike previous approaches which mainly deals with association rules in binary database, the approach deals with hiding the association rules in quantitative database. Numerical experiments were performed to measure the performance of the algorithm according to three criteria: the number of rules hidden, side effects and database effects of the algorithm. However, the algorithm only deals with association rule in small dataset in which the algorithm generated much rules but the algorithm is not efficient since a large part of the rules generated resulted into lost rules.</p><p>In this paper, we attempt to present a perturbation association rules hiding algorithm for privacy preservation of quantitative data with few rules and hides higher percentage of the rules by decreasing the support of the rule. The support of rule is decreased by decreasing the support of A. This is achieved by decreasing the support value of either A or B of the rule until either the support or confidence is below the minimum support or minimum confidence value respectively. The rest of this paper is organized as follows. Privacy preserving quantitative association rule hiding was defined in Section II, our approach to hide useful association rules in quantitative data was presented in Section III, the perturbation association rule hiding process was presented in Section IV, and the proposed algorithm related example was presented in Section V. Section VI includes the conclusion and future works.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">PROBLEM STATEMENT</head><p>The objective of privacy preserving data mining is to hide certain information so that they cannot be discovered through data mining techniques. There have been two broad approaches for privacy preserving data mining. The first approach, called output privacy, is to alter the data before delivery to data miner so that real data is obscured and mining result will not disclose certain privacy. For example, perturbation, blocking, merging, swapping and sampling are some methods that have been proposed for this type of output privacy. The second approach, called input privacy, is to manipulate the data using data distribution methods in which the privacy of the data is protected before releasing to the user. In this approach, mining result is not affected or minimally affected. Almost all of studies that have been proposed in this research area concentrated on hiding Boolean association rules which are concerned only with whether an item is present in a transaction or not, without considering its quantity. However, transactions with quantitative values are commonly found in real world application. For example, in a patient's blood test, many attributes could be found. In addition, attribute's quantity instead of just presence/absence of the attribute in blood is more important for determination of the illness. Furthermore, many people have the problem of sugar but this does not mean that one is sick or not, the only criterion to used to determine the illness is the surplus/deficiency in sugar 's quantity. Some works have been done to discover association rules from quantitative data which generate set of rules but hides less than 30% of the rules generated. This paper proposes a privacy preserving data mining algorithm (that uses the output privacy approach in which the data is preserved before it will be released to the miner) that improves on the association rule hiding algorithms for quantitative data by combining the perturbation method for privacy and association rule mining technique for privacy. Furthermore, the paper addresses the challenges of applying privacy algorithm to only Boolean data by applying the algorithm to quantitative data and not just the presence or absence of data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">PROPOSED ALGORITHM</head><p>In order to hide an association rule, A→B we can either decrease its support to be smaller than minimum support value or its confidence to be smaller than its minimum confidence value. To decrease the confidence of a rule, two strategies can be used. The first one is to increase the support count of A i.e. LHS of the rule, but not support count of A→B. The second one is to decrease the support count of A→B. For the second case, if we only decrease the support of B, the right hand side of the rule, it would reduce the confidence faster than simply reducing the support of A∪B. Based on these two strategies, we propose a privacy preserving data mining algorithm for hiding sensitive quantitative data items called perturbation of association rule for quantitative data using the concept of noise. This algorithm first calculates the value of noise for each data items and the column with the highest noise value form the rule with the sensitive column. Secondly, the algorithm find useful association rule that consist of only one item on both sides of the rule and then hide them using privacy preserving technique. For hiding purpose, the algorithm tries to decrease the support of rule A→B by decreasing the support count of itemset AB until either support or confidence value of the rule goes below minimum support or minimum confidence value respectively.  For X = = STEP 2: calculate the sumcount of each noisy attribute on the transaction data as = ∑ STEP 3: for each noisy attribute 1≤j≤m and 1≤k≤m check for the that has the maximum value. If satisfies the above condition then the column whose has the maximum value is put in the set of 1-itemset which form the left hand side (LHS) of the rule i.e ={ } STEP 4: join the 1-itemset to the sensitive column in a way similar to that of apriori algorithm to form a 2-itemset. The 2itemset is use to find the useful association rule by placing at the LHS and at the RHS similar to that of apriori algorithm STEP 5 (a): in order to hide sensitive rule, calculate the support and confidence of each rule</p><formula xml:id="formula_1">(( )) ( )<label>and</label></formula><formula xml:id="formula_2">(( )) ( ) ( ) ( ) ( ) STEP 5(b): A rule is hidden if ( ) Or ( ) if Sup(LHS,RHS) ≤ MST or conf(LHS,RHS) ≤ MCT = X+ Else =</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">ILLUSTRATION OF THE ALGORITHM</head><p>In this section, we give an example to illustrate how the proposed algorithm can be used. Let the original data be depicted below: has the maximum count is put in the set of 1-itemset which form the left hand side (LHS) of the rule i.e = * } In this case * } STEP 4: join the 1-itemset to the sensitive column in a way similar to that of apriori algorithm to form a 2-itemset. The 2itemmset is use to find the useful association rule by at the LHS and at the RHS similar to that of apriori algorithm STEP 5 (a): in order to hide sensitive rule, calculate the support and confidence of each rule we propose that in the proposed algorithm the association rule should contain more than one item on each side of the rule and that the algorithm should be used for text data after they might have been normalized into quantitative data.</p><formula xml:id="formula_3">A B C D T1<label>10</label></formula></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>3 )Algorithm 1 . 3 . 7 .</head><label>3137</label><figDesc>Minimum confidence threshold Output: A transformed database D where rules containing A on LHS (Left Hand Side) or B at the RHS (Right Hand Side) will be hidden. Transform the rough dataset(Rd) into original database(D) as Rd→D 2. For each itemset XɛD, for . Calculate the value of the noisy attribute V such that √ Calculate the sumCount of each noisy attribute for 4. If sumCount( ) = Maximum Value such that k Find 2-itemset from the union of and 8. Find ={ rules from itemset X} //for X= { } the possible rules are 9. Compute the support of rule (the confidence of the rule</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>3 . 1 STEP 1 :</head><label>311</label><figDesc>) 11. if Sup(LHS,RHS) ≤ MST or conf(LHS,RHS) ≤ MCT = X+ Else = 12. go to line 8 13. select the next rule 14. repeat // line 9,10 and 11 on each new rule 15. if is empty THEN 16. transform the updated database D and output the updated D Explanation to Abbreviations in the Algorithm LHS (left hand side): this is the left hand side of the rule RHS (right hand side): this is the right hand side of the rule generated MST (minimum support threshold): this is the support specified by the user of the algorithm MCT (minimum confidence threshold): this is the confidence threshold specified by the user min = minimum Sup/Supp = support 4. STEPS TO THE PROPOSED ALGORITHM n = total number of transaction data m= total number of attributes (items) D= attribute 1 ≤ i ≤ n = attribute 1 ≤ j ≤ m V= noise X= original data = inverse of original data MCT= minimum confidence threshold MST= minimum support threshold = each noisy attribute 1≤ k ≤ i for each transaction data D, i =1 to n, and for each attribute (item) j= 1 to m, transform the quantitative value into a noisy quantitative attribute value using the randomly generated formula √</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">CoRI'16, Sept 7-9, 2016, Ibadan, Nigeria.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">DISCUSSION OF RESULT</head><p>From the result shown in the transformed database, the algorithm was able to hide 4 out of the 5 items on the sensitive column resulting into 80% privacy protection of the sensitive column B.</p><p>Comparing with the previous works of Manoj and Joshi <ref type="bibr">[8]</ref> and Berberoglu and Kaya <ref type="bibr" target="#b9">[9]</ref> on the same dataset, which hide only 1 out of the 5 items, resulting into 20% privacy protection of the sensitive column B of the data while the proposed algorithm hides 80% of the sensitive column B.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">CONCLUSION AND FUTURE WORK</head><p>In this work, we proposed an improved algorithm for hiding sensitive quantitative data that combines the concept of noise with association rule mining to generate the useful association rules in quantitative data and then hide them using privacy concept. The algorithm works on association rules in quantitative data unlike previous work done in this field which works on binary data. In the future we plan to apply the algorithm to real life dataset; also</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title/>
		<author>
			<persName><surname>References</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Doug</forename><surname>Alexander</surname></persName>
		</author>
		<ptr target="http://www.laits.utexas.edu/anorman/BUS.FOR/course.mat/Alex/" />
		<imprint>
			<date type="published" when="2016-01">2016. January 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Johannes Gerhke Privacy preserving mining of association rules</title>
		<author>
			<persName><forename type="first">Alexandre</forename><surname>Evfimirvski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ramakrishnan</forename><surname>Srikant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rakesh</forename><surname>Agrawal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of the 8 th ACM SIGKDD international Conference on Knowledge discovery in databases and data mining</title>
				<meeting>the 8 th ACM SIGKDD international Conference on Knowledge discovery in databases and data mining<address><addrLine>Edmonton, Akberta, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">July 23-26, 2002</date>
			<biblScope unit="page" from="217" to="228" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">Rakesh</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ramakrishna</forename><surname>Srikant</surname></persName>
		</author>
		<title level="m">SIGMOD &apos;oo proceedings of the 2000 ACM SIGMOD international conference on Management of data</title>
				<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="439" to="450" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<author>
			<persName><forename type="first">Y</forename><surname>Lindell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Pinkas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in cryptology &apos;crypt &apos;000 proceedings</title>
				<imprint>
			<publisher>Springer-Vertag</publisher>
			<date type="published" when="2000-08">2000. August 2000</date>
			<biblScope unit="volume">1880</biblScope>
			<biblScope unit="page" from="20" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">-randomization in a privacy preserving data mining SIGKDD explorations</title>
		<author>
			<persName><forename type="first">Alexandre</forename><surname>Evfimievski</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002. 2002</date>
			<biblScope unit="volume">4</biblScope>
		</imprint>
	</monogr>
	<note>international journal of computer science and information technologies</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Hybrid algorithm for privacy preserving association rule mining</title>
		<author>
			<persName><forename type="first">Ila</forename><surname>Chandrakar</surname></persName>
		</author>
		<ptr target="http://www.ieee.org/documents/hybrid-algorithm" />
		<imprint>
			<date type="published" when="2016-05">2016. May 2016</date>
		</imprint>
		<respStmt>
			<orgName>Department of Information Technology VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Privacy Preserving Mining of Association Rules</title>
		<author>
			<persName><forename type="first">A</forename><surname>Evfimievski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Srikant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gehrk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th Conference on Knowledge Discovery and Data Mining</title>
				<meeting>the 8th Conference on Knowledge Discovery and Data Mining<address><addrLine>New York, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002. 2002</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Privacy Preserving Fuzzy Association Rules Hiding in Quantitative Data</title>
		<author>
			<persName><forename type="first">Manoj</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Joshi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Theory and Engineering</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1793" to="8201" />
			<date type="published" when="2009-10">2009. October, 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Hiding Fuzzy Association Rules in Quantitative Data</title>
		<author>
			<persName><forename type="first">T</forename><surname>Berberoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 3rd International Conference on Grid and Pervasive Computing Workshops</title>
				<imprint>
			<date type="published" when="2008-05">2008. May 2008</date>
			<biblScope unit="page" from="387" to="392" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
