A Survey on Association Rule Hiding in Privacy Preserving Data Mining
AbstractData mining has been used as a public utility in extracting knowledge from databases during recent years. Developments in data mining and availability of data and private information are the biggest challenge in this regard. Privacy preserving data mining is a response to this big challenge. The main purpose of techniques and algorithms in privacy preserving data mining is non-disclosure of sensitive and private data with minimum changes in databases so that it would not have adverse effects on the rest of data. The present paper intends to present a brief review of methods and techniques regarding privacy of data mining in association rules, their classification and finally, classification of hiding algorithms of association rules followed by a comparison between a numbers of these algorithms.
 Li, X., Liu, Z. and Zuo, C., 2009, June. "Hiding association rules based on relative-non-sensitive frequent itemsets". In Cognitive Informatics. ICCI'09. 8th IEEE International Conference, 2009, pp. 384-389.
 Natarajan, R., Sugumar, R., Mahendran, M., & Anbazhagan, K. "Design and Implement an Association Rule hiding Algorithm for Privacy Preserving Data Mining". International Journal of Advanced Research in Computer and Communication Engineering, 2012, 1(7).
 Oliveira, S. R., & Zaiane, O. R. "Privacy preserving frequent itemset mining". Paper presented at the Proceedings of the IEEE international conference on Privacy, security and data mining, 2002, Vol 14.
 Oliveira, S. R., & Zaiane, O. R. Algorithms for balancing privacy and knowledge discovery in association rule mining. Paper presented at the Database Engineering and Applications Symposium, 2003. Proceedings. Seventh International.
 Saygin, Y., Verykios, V. S., & Clifton, C. "Using unknowns to prevent discovery of association rules". ACM Sigmod Record, 30(4), 2001, pp. 45-54.
 Shah, K., Thakkar, A., & Ganatra, A. "Association Rule Hiding by Heuristic Approach to Reduce Side Effects & Hide Multiple RHS Items". International Journal of Computer Applications,2012, 45(1).
 Verykios, V. S., Elmagarmid, A. K., Bertino, E., Saygin, Y., & Dasseni, E. "Association rule hiding. Knowledge and Data Engineering", IEEE Transactions on, 16(4), 2004, pp. 434-447.
 Wang, E. T., & Lee, G. "An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining". Data & Knowledge Engineering, 65(3), 2008, pp. 463-484.
 Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., & Verykios, V. "Disclosure limitation of sensitive rules". In Knowledge and Data Engineering Exchange, (KDEX'99) Proceedings. Workshop, 1999, pp. 45-52. IEEE.
 Dasseni, Elena, Vassilios S. Verykios, Ahmed K. Elmagarmid, and Elisa Bertino. "Hiding association rules by using confidence and support." In Information Hiding. Springer Berlin Heidelberg, 2001, pp. 369-383.
 Ganatra, K. S. a. A. T. a. "Association Rule Hiding by Heuristic Approach to Reduce Side Effects and Hide Multiple R.H.S. Items". International Journal of Computer Applications, 2012, 45, pp. 1-7.
 Oliveira, S. R. "Protecting sensitive knowledge by data sanitization". 13th IEEE International Conference on Data Mining, 2003.
 Wang, S.-L., Parikh, B., & Jafari, A. "Hiding informative association rule sets. Expert Systems with Applications", 33(2), 2007, pp. 316-323.
 Wang, S.-L., Patel, D., Jafari, A., & Hong, T.-P. "Hiding collaborative recommendation association rules. Applied Intelligence", 27(1), 2007, pp. 67-77.
 Yeh, J.-S., Hsu, P.-C., & Wen, M.-H. (2008). "Novel Algorithms for Privacy Preserving Utility Mining. Paper presented at the Intelligent Systems Design and Applications", 2008. ISDA'08. Eighth International Conference on Intelligent Systems Design and Applications Vol. 1 pp. 291-296.
 C-W. Lin, T-P. Hong, H-C. Hsu, "Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining", The Scientific World Journal, Vol. 2, 2014.
 Cheng, P., Roddick, J. F., Chu, S. C., & Lin, C. W. "Privacy preservation through a greedy, distortion-based rule-hiding method". Applied Intelligence, pp. 1-12, 2015.