Hiding Sensitive Rules Based on Transaction Grouping
碩士 === 中原大學 === 資訊工程研究所 === 98 === As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclose...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/58538882177123969090 |
id |
ndltd-TW-098CYCU5392003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098CYCU53920032015-10-13T13:43:19Z http://ndltd.ncl.edu.tw/handle/58538882177123969090 Hiding Sensitive Rules Based on Transaction Grouping 以交易分群隱藏敏感性法則 Jei-Hung Yang 楊介宏 碩士 中原大學 資訊工程研究所 98 As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average. Yi-Hung Wu 吳宜鴻 2010 學位論文 ; thesis 55 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中原大學 === 資訊工程研究所 === 98 === As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
|
author2 |
Yi-Hung Wu |
author_facet |
Yi-Hung Wu Jei-Hung Yang 楊介宏 |
author |
Jei-Hung Yang 楊介宏 |
spellingShingle |
Jei-Hung Yang 楊介宏 Hiding Sensitive Rules Based on Transaction Grouping |
author_sort |
Jei-Hung Yang |
title |
Hiding Sensitive Rules Based on Transaction Grouping |
title_short |
Hiding Sensitive Rules Based on Transaction Grouping |
title_full |
Hiding Sensitive Rules Based on Transaction Grouping |
title_fullStr |
Hiding Sensitive Rules Based on Transaction Grouping |
title_full_unstemmed |
Hiding Sensitive Rules Based on Transaction Grouping |
title_sort |
hiding sensitive rules based on transaction grouping |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/58538882177123969090 |
work_keys_str_mv |
AT jeihungyang hidingsensitiverulesbasedontransactiongrouping AT yángjièhóng hidingsensitiverulesbasedontransactiongrouping AT jeihungyang yǐjiāoyìfēnqúnyǐncángmǐngǎnxìngfǎzé AT yángjièhóng yǐjiāoyìfēnqúnyǐncángmǐngǎnxìngfǎzé |
_version_ |
1717740861692837888 |