Research Article | Open Access
Chongjing Sun, Yan Fu, Junlin Zhou, Hui Gao, "Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response", The Scientific World Journal, vol. 2014, Article ID 686151, 10 pages, 2014. https://doi.org/10.1155/2014/686151
Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response
Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.
The rapid development of Internet technology, cloud computing, mobile computing, and Internet of things has produced the exploding large datasets, the so-called big data. The data can be used to capture the useful information and interesting patterns and indeed help people to make effective decisions. Data mining is a powerful technique which can discover the hidden interesting patterns and models. By analyzing the data, data mining offers considerable benefits to the consumers, companies, and organizations.
Association rule mining is a popular and important technique of data mining. It is intended to discover the interesting patterns from the large transaction data, that is, frequent patterns and association rules. These rules can be used to improve the market decision making, such as promotional pricing or product placements. For example, by analyzing the transactions data from a supermarket, the rule found that customers who buy diapers also tend to buy beer. Nowadays, association rule mining is employed in many application areas such as Web usage mining, intrusion detection, and bioinformatics.
The process of mining association rules contains two main steps . The first step is to discover all the frequent itemsets with the support being higher than the minimum support. The second step generates the strong rules based on the frequent itemsets found in the first step, and the strong rules have confidence greater than the minimum confidence. In this paper, we focus on the frequent itemset mining, which is the most important part of association rule mining.
With the exponentially increasing information being collected for analysis, there is growing concern about the privacy problem. In fear of the privacy problem, some people might be reluctant to provide the true information. The survey  conducted in 1993 demonstrated the worries of people about the privacy. 17% of the respondents are extremely concerned about their personal information. They were reluctant to provide any data and even the privacy protection measures were in place. However, 56% of them were willing to provide their information under the condition that privacy protection methods were adopted. The remaining 27% of them are marginally concerned about their privacy and willing to provide data under any condition. Therefore, in order to collect the true data, privacy protection measures must be taken for protecting the personal information. Besides, before outsourcing or sharing the data with other companies, the data owner also must take some privacy-preserving measures.
Two privacy environments are proposed in  based on the privacy mechanisms. The first one is B2B (business to business), which assures that the data obtained from the users would be preprocessed by the privacy-preserving techniques before being supplied to the data miner. The second one is B2C (business to customer), which provides the privacy protection at the point of data collection, that is, at the user site. In order to protect the sensitive information, we proposed methods which can be used under both environments. We focus on the privacy of input data in the frequent itemset mining process. Under the B2C environment, the personal data are randomized after each user provides them and then sent to the data collector. Under the B2B environment, the collected dataset is randomized before outsourcing or sharing with others even at public.
Although many works have been proposed to handle the privacy problem in the frequent itemset mining process, few of them focused on the personalized privacy problem. Xiao and Tao  proposed the personalized privacy preservation problem considering that different people need different levels of privacy protection, and they used the generalization techniques. Besides, they also raise the problem of the multipublishing , wherein different recipients can have different privacy protection levels on the original dataset.
In this paper, we define the personalized privacy as different privacy levels on different attributes or items in the process of frequent itemset mining. For example, the customer does not care too much about the disclosure of the information that he bought daily necessities. But he will concern heavily about the privacy problem if he bought some sensitive items. If we provide the same level of privacy protection for different items, the data utility will be lost too much in order to satisfy all items privacy requirements. This is because the nonsensitive items also are disturbed too heavily. Hence, it is necessary to provide the different degree of privacy protection for different items or attributes.
To solve the above personalized privacy problem, we use the randomized response technique . Based on the MASK , we give the solution on how to reconstruct the associations under the different privacy protections. Our method can be used to preserve the privacy under both the B2B and B2C environments. Besides, we design a method to accelerate the itemset support computation. Finally, our experimental results show that the performance of our method is better than the traditional method with respect to the accuracy, while satisfying the different privacy requirements.
The rest of this paper is organized as follows. In Section 2, we review the previous related works. Section 3 gives some related preliminaries and defines the personalized privacy problem. Then in Section 4, we describe the proposed method on the personalized privacy protection and how to discover the frequent itemset from the randomized data. We evaluate our technique in Section 5 by experiments and conclude our work in Section 6.
2. Related Works
There are many works on the privacy problem in the association rule mining, and they can be divided into two research streams : input data privacy and output rule privacy. Most of them focus on the second one. To preserve the input data privacy, some methods are adopted to disturb the original data so that the attacker cannot get the true data of users. For the output rule privacy, the collected data are heuristically altered in order to protect some sensitive rules being mined from the dataset by data miners.
The association rule hiding algorithms, which protect the output rule privacy, can be divided into three categories , namely, heuristic approaches, border-based approaches, and exact approaches. The first class of approaches selectively sanitizes a set of transactions from the database to hide the sensitive rules efficiently, which suffer from high side effects. Two classic techniques in this class of approaches are distortion [9, 10] and blocking [11, 12]. The second set of approaches [13, 14] hide the sensitive rules by modifying the original borders in the lattice of the frequent and infrequent itemsets in the database. The third set of approaches [15, 16] hide the sensitive rules by solving the Constrain Satisfaction problem using the integer or linear programming. They can find the optimality to hide the rules with high computation cost.
In this paper, we solve the problem of the data input privacy, and the corresponding approaches can be divided into cryptograph-based and reconstruction-based methods. The cryptograph-based approaches handle the problem that some partners want to discover shared association rule from the global data without disclosing their sensitive data to others. The global data may be vertically partitioned  or horizontally partitioned  and distributed in many partners. The reconstruction-based methods firstly randomize the original data to hide the sensitive data and then reconstruct the interesting patterns based on the statistical features without knowing true values. For the centralized data, there are two distortion strategies, statistical distortion and algebraic distortion. Rizvi and Haritsa  proposed the MASK approach to disturb the original sparse Boolean databases. This method retains each 0 or 1 bit in the database with the probability as and flips this value with the probability as . Zhang et al.  proposed the solution with the algebraic distortion. By using the eigenvalues and eigenvectors, the data of users can be distorted by matrix transformation and noise addition.
Our work focuses on the input data privacy problem of the centralized data. The frequent itemset mining is conducted on the distorted data that is randomized by the randomized response technique. All the above algorithms did not mention the personalized privacy problem that we solve in this paper.
3. Preliminaries and Problem Definition
In this section, we introduce the related preliminaries about the privacy-preserving frequent itemset mining and give the problem definition of this paper.
3.1. Association Rule Mining
Let be a set of items and the database containing a set of transactions, wherein each transaction is a set of items such that . A transaction is said to contain if and only if . A rule is an implication of the form , where , and . The support of the rule is defined in (1) and its confidence is defined in (2): where is the percentage of transactions in that contain and is defined as the percentage of transactions containing .
A set of items is said to be frequent if and only if is greater than the user-defined minimum support. Then is a frequent itemset. If the rule has the support greater than the minimum support and its confidence is greater than the minimum confidence, then is an interesting rule, that is, association rule. From (1) and (2), it is shown that finding the association rules is effectively equivalent to generating all the frequent itemsets with support greater than the minimum support. Therefore, we focus on the frequent itemset mining.
3.2. Randomized Response
Randomized response technique was first introduced by Warner  to solve the statistical survey problem of the sensitive questions. For example, social scientists want to know how many people in some area use drugs. Usually, respondents are reluctant to directly answer this kind of questions. Hence, Warner proposed the randomized response.
To ask a binary choice question about whether people have a sensitive attribute , the randomized response gives two related questions like the following:(1)I have the sensitive attribute ;(2)I do not have the sensitive attribute .
Respondents decide which question to answer with a probability . Then the interviewer only gets a “yes” or “no” without knowing which question the respondent answered. If a respondent has the sensitive attribute , then he will give the answer “yes” to answer the first question with probability as or “no” with probability as . If a person does not have , then he will give “no” with probability as to answer the first question and “yes” with probability as to answer the second question. Hence the probability that an interviewer gets the answer “yes” can be computed by (3) while getting “no” can be computed by (4): where is the proportion of the respondents that have the attribute , while is the proportion of respondents that do not have the attribute . The interviewer can get the proportion of respondents having the attribute , , by solving (3) and (4).
3.3. Problem Definition
In this paper, we solve the data privacy problem with respect to the frequent itemset mining under the B2B environments as well as the B2C environment.
Under the B2C model, the interviewer can conduct a survey containing sensitive questions. For example, the questions on “whether you are divorced,” “whether you have criminal records,” or “whether you use drugs” are sensitive. This kind of surveys can analyze the association between factors and indeed reflect sociology problems. In this model, respondents disturb survey vectors with the given parameters and then send them to the reviewers.
Under the B2B model, the data owner such as supermarket managers disturbs the original data before sharing with other business partners. Taking the market transactions as an example, customers are reluctant to let others know what he or she bought, especially some sensitive products. By taking the privacy protection measures, transaction details can be hidden without leaking the personal privacy.
Considering the data utility and different degree of privacy requirements, the protection on the different attributes or items should be different. For example, the customer does not care too much about the disclosure that he bought papers, while concerning heavily on some sensitive items.
The problem of personalized privacy-preserving frequent itemset mining is, given the original transaction dataset , how to disturb into satisfying the different privacy requirements and mine frequent itemsets from , so that the frequent itemsets mined from are close to the frequent itemsets mined from as much as possible.
4. Personalized Privacy-Preserving Frequent Itemset Mining
In this section, we present the procedure on how to distort the original data by the randomized response technique satisfying the personalized privacy requirement. Then, we give the method to reconstruct itemset support from the distorted data. Finally, we devise a personalized privacy-preserving frequent itemset mining algorithm based on the Apriori algorithm.
4.1. Personalized Data Distortion
Suppose there are items in the database . Each transaction in is represented by a binary vector . if this transaction contains the item ; otherwise, . For each item , , there is a probability parameter to disturb the data on the item , and these parameters form a vector shown in formula (5). Then the distorted value of this transaction on item can be expressed in (6), where is a value randomly drawn from a uniform distribution over the interval :
From (6) we can see that the th value of transaction is kept with probability and flipped with probability . The proportion of can be calculated by (7), and the proportion of can be calculated by (8):
For the personalized privacy requirements, different items are distorted with different probability parameters. For a given parameter , the probability of correct reconstruction on the value is calculated by
The first part in (9) means that the original value is distorted into value and then reconstructed from , and the second part is for the distorted value . Finally, the probability can be computed by (10), where is the support of item in original database. The similar derivation of (10) can be found in :
The reconstruction probability curves of (10) are shown in Figure 1. We can see that the higher the item support is, the easier this item having value 1 will be reconstructed. Besides, the curves are symmetric around . The further the distance between and 0.5, the easier the item having value 1 will be reconstructed. Therefore, for a given item, the different probability parameters will lead to the different degree of privacy protection. The parameters for items will be set by the data owner according to the properties of these items. For example, the parameter for the item milk can be very high even 1.0, while for the drugs it can be more close to 0.5.
Under the B2C environment, the interviewer and the respondents cooperate with each other to set the parameter vector . Then respondents disturb their personal data and send them to the interviewer. While under the B2B environment, the data owner disturbs the original data with parameter vector and sends the distorted data with to the third parties.
4.2. Itemset Support Reconstruction
After getting the distorted data , the data mining will reconstruct the support for itemsets to find the frequent ones. In order to reconstruct the support of an itemset, we need to get the count of every combination of the items in this itemset. For example, in order to compute the support of itemset in original dataset , that is, , we compute the count of 23 combinations of in , that is, , , and . This is because the original value can be distorted to these 23 combinations of .
The combination in the original database can be distorted into any combination in . According to the probability theory, the probability of being distorted to can be computed by where is the Hadamard product of two vectors and is the distorting probability parameters corresponding to the items. prod() returns the product of the vector elements. That means that if the value on an item is kept, then the is multiplied to , otherwise . An example with as 3 in Table 1 illustrates the formulation on the transition matrix.
Corresponding to the combinations defined in (11) of the given items, we define their counts in the original database and the distorted database , respectively, in (14), where is the count vector for , while is the count vector for . and are the counts of the combination for the items in and , respectively:
Then the relationship between and can be expressed by (15) according to the randomized response distortion mechanism:
After getting the transition matrix with elements computed by (12), we can reconstruct the counts of combinations by (16). Hence, we evaluate the performance of the reconstruction by computing the difference between and :
The count of the last combination divided by the number of transactions is the estimated support of the corresponding itemset as shown in (17), where is the number of transactions in :
4.3. Mining Frequent Itemset from Distorted Dataset
We mine the frequent itemset from the database by using the classic Apriori algorithm, which employs an iterative approach to search the frequent itemset. The frequent -itemsets are used to generate the candidate -itemsets by the AprioriGen. Then Apriori computes the support of candidate -itemsets and filters out the itemsets with support less than the minimum support. These operations iteratively run until no more frequent itemsets can be found.
In the privacy-preserving personalized frequent itemset mining, we need to reconstruct the support of candidate itemsets from the distorted database. For a candidate itemset, we compute the counts of all its items combinations. In order to accelerate the counting speed, we firstly remove the items with support less than the minimum support. Then for the candidate itemset , we extract the subdataset from the database . In the subdataset , we map each transaction into a value by
By (18), a vector will be computed, wherein . Then in (14) is the count of elements in equal to . By this method, it is very fast to compute the vector . Figure 2 gives an example of transaction mapping that maps the transaction into a value. By computing the count of each value from 0 to 7, we can get the counts of all the combinations for the itemset . By using (16) and (17), we can get the support of the itemset .
In our privacy-preserving personalized frequent itemset mining, we iteratively generate the candidate -itemset from the frequent -itemset and check the support of the candidate itemset using the itemset support reconstruction.
5. Experimental Results
In this section, we evaluate the performance about the personalized privacy-preserving frequent itemset mining on the real dataset and synthetic datasets generated by the classic IBM Quest Market-Basket Synthetic Data Generator. (The C++ source code can be downloaded at http://www.cs.loyola.edu/~cgiannel/assoc_gen.html).
The synthetic datasets are generated by the IBM Almaden generator with the parameters TIDN , where is the average size of the transactions, is the average size of the maximal potentially large itemsets, is the number of transactions, and is the number of items. We generated two synthetic datasets T3.I4.D500K.N10 and T40.I10.D100K.N942.
The real dataset is BMS-WebView-1 , which contains the click-stream data from the website of a legwear and leg care retailer. The dataset contains 59,602 transactions and 497 items. We scaled the dataset with a factor of 10 and got the dataset BMS-WebView-1x10, which contains 596,020 transactions and 497 items.
5.2. Evaluation Metrics
We evaluate our method on the distorted database by two kinds of error metrics , the support errors and the identity error. Let be the frequent itemsets discovered from the original database by the Apriori algorithm and represent the reconstructed frequent itemset minded from the distorted database by our method.
The support error metric is evaluated by (19), which reflects the relative error in the support values. We measure the average error based on the frequent itemsets which are correctly identified to be frequent, that is, , with the given minimum support :
The identity error metrics are given in (20). indicates the percentage of false positive, that is, the percentage of reconstructed itemsets which do not exist in the original frequent itemsets. indicates the percentage of false negative, that is, the percentage of original frequent itemsets which are not correctly reconstructed as frequent:
The corresponding metrics are illustrated in Figure 3. For the part of metric , the intersection of two frequent itemsets and is maybe empty. Under this condition, we do not compute the result of .
5.3. Results Analysis
We evaluate our method by measuring the support error and the two identity errors shown in formulas (19), (20), and we conduct our experiments on the three given datasets described in Section 5.1. We compare our method with MASK which distorts the original dataset with only one parameter value . If the personalized distorted vector of our method is , then . In our experiments, the elements in the personalized distorted vector in formula (5) are generated following the uniform distribution with the range of . The average value of vector is 0.8741. In order to protect all the items or attributes in a dataset, the parameter in MASK must be set as 0.8. Therefore, we compare our method with the MASK having the parameter as 0.8.
5.3.1. Comparisons with Different Minimum Support
The first experiment was conducted on the T3.I4.D500K.N10. In this experiment, we set the minimum support from 0.05% to 0.95% with the step length as 0.05%. For each minimum support, we ran the MASK and our personalized method 100 times and compute the average values and the standard deviations of evaluation metrics. The results are shown in Figures 4, 5, and 6.
From Figures 4, 5, and 6, we can see that our method can have smaller error than MASK. This is because the MASK has to distort all the items or attributes in the maximum distorting level in order to protect each item or attribute, while our method distort different items with different distorting level. The results show that our method only leads to half of support error of MASK in the dataset T3.I4.D500K.N10. Besides, from Figures 5 and 6, we can see that our method can have much smaller deviations of identity errors.
We conducted the same experiments on the real dataset BMS-WebView-1x10. For this dataset, we set the minimum support from 0.2% to 0.55% with the step length as 0.05%, and for each minimum support, we ran the algorithms 20 times. As the average value of elements in vector is 0.8741, we also ran the MASK with parameter as 0.8741. Besides, we ran the MASK with as the maximum value of , that is, 0.95.
We show the results in Figures 7, 8, and 9, and the results here show that our method is much better than MASK with as 0.8. However, the results of our method are much similar to the results of MASK with as 0.8741, the average value of vector for our method. Similar results can be found in Figures 13, 14, and 15 on the dataset T40.I10.D100K.N942. But the MASK with as 0.8741 cannot protect all the items or attributes, because some attribute needs protection with privacy level smaller than 0.8741, such as 0.85. For the three metrics, the results of MASK with as 0.95 are better than our method. This is because the privacy protection level of each attribute in our method is between 0.8 and 0.95.
5.3.2. The Impact of the Size of Dataset
We conduct the second experiment to evaluate the impact of the size of dataset on the reconstruction errors shown in formulas (19), (20). The dataset BMS-WebView-1x10 is formed from the dataset BMS-WebView-1 by copying it 10 times. Similarly, we set the minimum support of frequent itemset mining from 0.2% to 0.55% with the step length as 0.05% and run the algorithms 20 times for each minimum support.
The corresponding results in Figures 10, 11, and 12 show that the reconstruction errors on BMS-WebView-1x10 are much smaller than the errors on BMS-WebView-1 for both MASK and our method. Note that the frequent itemsets discovered from BMS-WebView-1 are the same as the frequent itemsets discovered from BMS-WebView-1x10. This gives us a thought that if we want to improve the reconstruction results, we can copy the original dataset many times and distort the new dataset and send it to the cooperated party. Then the cooperated party can accurately discover the interesting patterns without knowing the original private information.
5.3.3. Comparisons with Different Lengths of Frequent Itemset
The third experiment is conducted on the dataset T40.I10.D100K.N942. In this experiment, we set the minimum support as 1.45%, and we run the corresponding algorithms 5 times and get the average values. We also set the parameter of MASK as 0.8, 0.8741, and 0.95 separately.
For the minimum support 1.45%, the maximum length of original frequent itemsets is 8, and the number of frequent -itemset is shown in Table 2. Then we compare the result on each itemset length from 1 to 8. The results shown in Figures 13, 14, and 15 demonstrate that our method performs better than MASK with as 0.8 for each itemset length and performs very similar to the MASK with as 0.8741.
In Figure 13, as the intersection set of frequent 8-itemsets reconstructed by MASK with as 0.8 and original frequent 8-itemsets is an empty set, the support error cannot be computed; then the value cannot be shown. We cannot conclude the clear trend of the reconstruction error with the itemset length increasing. In Figure 14, when is 8, the frequent itemset added ratio increased sharply. By carefully analyzing the results, we found that many new frequent itemsets have the support very close to the minimum support, which leads to the heavy identity error.
In this paper, we solve the problem of how to provide the personalized privacy protection on different attributes or items while discovering the frequent itemsets. Based on the classic randomized response technique, we proposed a personalized privacy-preserving method. Besides, we proposed a method to improve the efficiency of counting the frequent itemsets by mapping the frequent itemset vector into a value. Experimental results show that the personalized privacy protection method can have much better performance than the traditional privacy protection method which provides the same privacy protection for the different items. From the experimental results, we can see that we can copy the original dataset many times to create a new dataset and then distort this new dataset. Then the others can discover the frequent itemsets with smaller error at the expense of more computation and communication cost.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This research work was supported in part by the National Natural Science Foundation of China under Grant no. 61003231, no. 61103109, and no. 11105024 and by the Fundamental Research Funds for the Central Universities under ZYGX2011J057. The authors are grateful for the anonymous reviewers who made constructive comments.
- R. Agrawal and R. Srikant, “Fast algorithms for mining association rules,” in Proceedings of the 20th International Conference on Very Large Data Bases (VLDB '94), vol. 1215, pp. 487–499, Santiago de Chile, Chile, September 1994.
- L. F. Cranor, J. Reagle, and M. S. Ackerman, Beyond Concern: Understanding Net Users' Attitudes about Online Privacy, MIT Press, Cambridge, Mass, USA, 2000.
- J. R. Haritsa, “Mining association rules under privacy constraints,” in Privacy-Preserving Data Mining, pp. 239–266, Springer, New York, NY, USA, 2008.
- X. Xiao and Y. Tao, “Personalized privacy preservation,” in Proceedings of the ACM International Conference on Management of Data (SIGMOD '06), pp. 229–240, ACM, Chicago, Ill, USA, June 2006.
- X. Xiao, Y. Tao, and M. Chen, “Optimal random perturbation at multiple privacy levels,” Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 814–825, 2009.
- A. C. Tamhane, “Randomized response techniques for multiple sensitive attributes,” Journal of the American Statistical Association, vol. 76, no. 376, pp. 916–923, 1981.
- S. J. Rizvi and J. R. Haritsa, “Maintaining data privacy in association rule mining,” in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB '02), pp. 682–693, VLDB Endowment, Hong Kong, August 2002.
- V. S. Verykios and A. Gkoulalas-Divanis, “A survey of association rule hiding methods for privacy,” in Privacy-Preserving Data Mining, pp. 267–289, Springer, New York, NY, USA, 2008.
- Y.-H. Wu, C.-M. Chiang, and A. L. P. Chen, “Hiding sensitive association rules with limited side effects,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 1, pp. 29–42, 2007.
- E. D. Pontikakis, A. A. Tsitsonis, and V. S. Verykios, “An experimental study of distortion-based techniques for association rule hiding,” in Research Directions in Data and Applications Security XVIII, vol. 144 of IFIP International Federation for Information Processing, pp. 325–339, Springer, 2004.
- E. D. Pontikakis, Y. Theodoridis, A. A. Tsitsonis, L. Chang, and V. S. Verykios, “A quantitative and qualitative analysis of blocking in association rule hiding,” in Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES '04), pp. 29–30, ACM Press, Washington, DC, USA, October 2004.
- S.-L. Wang and A. Jafari, “Using unknowns for hiding sensitive predictive association rules,” in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI '05), pp. 223–228, IEEE, Las Vegas, Nev, USA, August 2005.
- S. Xingzhi and P. S. Yu, “A border-based approach for hiding sensitive frequent itemsets,” in Proceedings of the 5th IEEE International Conference on Data Mining (ICDM '05), pp. 426–433, IEEE, Houston, Tex, USA, November 2005.
- G. V. Moustakides and V. S. Verykios, “A max-min approach for hiding frequent itemsets,” in Proceedings of the 6th IEEE International Conference on Data Mining Workshops (ICDM '06), pp. 502–506, Hong Kong, December 2006.
- S. Menon, S. Sarkar, and S. Mukherjee, “Maximizing accuracy of shared databases when concealing sensitive patterns,” Information Systems Research, vol. 16, no. 3, pp. 256–270, 2005.
- A. Gkoulalas-Divanis and V. S. Verykios, “An integer programming approach for frequent itemset hiding,” in Proceedings of the 15th ACM Conference on Information and Knowledge Management (CIKM '06), pp. 748–757, ACM, Arlington, Va, USA, November 2006.
- J. Vaidya and C. Clifton, “Privacy preserving association rule mining in vertically partitioned data,” in Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '02), pp. 639–644, ACM, Alberta, Canada, July 2002.
- M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules on horizontally partitioned data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026–1037, 2004.
- N. Zhang, S. Wang, and W. Zhao, “A new scheme on privacy preserving association rule mining,” in Knowledge Discovery in Databases: PKDD 2004, vol. 3202 of Lecture Notes in Computer Science, pp. 484–495, 2004.
- S. L. Warner, “Randomized response: a survey technique for eliminating evasive answer bias,” Journal of the American Statistical Association, vol. 60, no. 309, pp. 63–66, 1965.
- Z. Zheng, R. Kohavi, and L. Mason, “Real world performance of association rule algorithms,” in Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '01), pp. 401–406, ACM, San Francisco, Calif, USA, August 2001.
Copyright © 2014 Chongjing Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.