Beta
292030

AN EFFICIENT HIDING METHOD FOR PRIVACY PRESERVING UTILITY MINING

Article

Last updated: 03 Jan 2025

Subjects

-

Tags

-

Abstract

Due to the rapid evolution of data saved in electronic form, data mining technologies have become critical and indispensable in looking for nontrivial, implicit, hidden, and possibly beneficial information in enormous volumes of data. High Utility Pattern Mining (HUPM), among the most intriguing data mining techniques, is broadly leveraged to analyze business interactions in market data based on the notion of economic utilities. These economic utilities can be used to examine the factors influencing a customer's purchasing behavior or to come up with new tailored selling and promotion tactics. This in turn has made utility-driven techniques an essential operation and vital activity for many data analysts since they can lead to proper decision-making processes. Nevertheless, such techniques can also lead to major threats regarding privacy and information security if they were misused. Privacy-Preserving Utility Mining (PPUM), also known as High Utility Pattern Hiding (HUPH), has recently emerged to mitigate the security and privacy issues that could happen in the utility framework. In this paper, we propose a heuristic PPUM method, named HUP-Hiding, to protect the results when mining sensitive data using a utility mining algorithm. The proposed method employs a dataset projection mechanism and a new victim item selection technique to efficiently perform the sanitization process. Experiments were performed to verify the reliability of the suggested algorithm. Our experimental results on different datasets confirm that HUP-Hiding has reasonable performance and fewer side effects compared to existing approaches.

DOI

10.21608/ijicis.2022.142694.1191

Keywords

privacy preserving, Data Science, Utility Mining, Sensitive pattern, Sanitization process

Authors

First Name

Mohamed

Last Name

Ali

MiddleName

Ashraf

Affiliation

Information Systems department, Computer Science, Ain Shams, Cairo, Egypt

Email

mohamed.hassan.std2@cis.asu.edu.eg

City

Cairo

Orcid

0000-0003-1342-9482

First Name

Sherine

Last Name

Rady

MiddleName

-

Affiliation

Information Systems Dept, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt

Email

srady@cis.asu.edu.eg

City

Cairo

Orcid

0000-0003-4991-966X

First Name

Tamer

Last Name

Abdelkader

MiddleName

-

Affiliation

Information Systems Dept, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt

Email

tammabde@cis.asu.edu.eg

City

Cairo

Orcid

0000-0003-4060-2535

First Name

Tarek

Last Name

Gharib

MiddleName

F.

Affiliation

Information Systems Dept, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt

Email

tfgharib@cis.asu.edu.eg

City

Cairo

Orcid

0000-0003-0780-782X

Volume

23

Article Issue

1

Related Issue

40411

Issue Date

2023-03-01

Receive Date

2022-06-15

Publish Date

2023-03-01

Page Start

69

Page End

83

Print ISSN

1687-109X

Online ISSN

2535-1710

Link

https://ijicis.journals.ekb.eg/article_292030.html

Detail API

https://ijicis.journals.ekb.eg/service?article_code=292030

Order

292,030

Type

Original Article

Type Code

494

Publication Type

Journal

Publication Title

International Journal of Intelligent Computing and Information Sciences

Publication Link

https://ijicis.journals.ekb.eg/

MainTitle

AN EFFICIENT HIDING METHOD FOR PRIVACY PRESERVING UTILITY MINING

Details

Type

Article

Created At

23 Dec 2024