Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding. (1st July 2018)
- Record Type:
- Journal Article
- Title:
- Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding. (1st July 2018)
- Main Title:
- Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding
- Authors:
- Menaga, D.
Revathi, S. - Abstract:
- Abstract : Privacy preserving data mining (PPDM) is a well‐known research area, which can analyse the database ensuring privacy such that it does not expose the confidential details. This study proposes a technique of secret key generation for privacy preserving using the least lion optimisation algorithm (LLOA). The proposed algorithm involves two stages: rule mining and secret key generation for the sanitisation. Initially, whale optimisation algorithm mines the association rules for the input database and validates the rules with the newly formulated fitness function. An algorithm, LLOA is developed by modifying the lion optimisation algorithm (LOA) with the inclusion of least mean square (LMS) which generates a secret key to provide privacy in mining. With the secret key, LLOA converts the original database into the sanitised database. Then, the algorithm optimally selects a secret key such that the sanitised database hides sensitive information by the utilisation of two factors, namely, privacy factor and utility factor, in its objective function. From the results, it can be shown that the LLOA technique attains the privacy of 84.36, 83.74, and 82.46%; and utility of 81.37, 83.96, and 81.37%, for chess, T10I4D100K, and retail datasets.
- Is Part Of:
- IET information security. Volume 12:Number 4(2018)
- Journal:
- IET information security
- Issue:
- Volume 12:Number 4(2018)
- Issue Display:
- Volume 12, Issue 4 (2018)
- Year:
- 2018
- Volume:
- 12
- Issue:
- 4
- Issue Sort Value:
- 2018-0012-0004-0000
- Page Start:
- 332
- Page End:
- 340
- Publication Date:
- 2018-07-01
- Subjects:
- particle swarm optimisation -- data privacy -- data mining -- search problems -- public key cryptography
least lion optimisation algorithm -- secret key generation -- data mining -- PPDM techniques -- rule mining -- input database -- privacy factor -- particle swarm optimisation -- Cuckoo optimisation algorithm -- LLOA technique -- privacy preserving association rule hiding -- sensitive information hiding -- privacy preserving data mining -- fitness function -- sanitised database -- utility factor -- objective function -- search process -- firefly algorithm -- retail dataset
Computer security -- Periodicals
Cryptography -- Periodicals
Computer networks -- Security measures -- Periodicals
Database security -- Periodicals
005.8 - Journal URLs:
- https://ietresearch.onlinelibrary.wiley.com/journal/17518717 ↗
http://digital-library.theiet.org/content/journals/iet-ifs ↗
http://www.ietdl.org/IET-IFS ↗
http://www.theiet.org/ ↗ - DOI:
- 10.1049/iet-ifs.2017.0634 ↗
- Languages:
- English
- ISSNs:
- 1751-8709
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 4363.252660
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 24496.xml