High Data Utility by Employing the Large Scale Data Sampling and Length Constraint Strategy

Ch. Raja Kumar, D. Srinivas

Abstract


We intend an original differential private frequent item sets mining algorithm for big data by integration the ideas which has improved presentation due to the new example and improved truncation performance. We construct our algorithm on FP-Tree for recurrent item sets mining. In arrange to resolve the trouble of structure FP-Tree with large-scale data; we initial utilize the sampling idea to get hold of delegate data to colliery probable congested recurrent item sets, which are presently used to come across the last everyday items in the large-scale data. In count, we occupy the length constriction policy to get to the bottom of the predicament of elevated global compassion. In particular, we use sequence corresponding thoughts to realize the most an alogous string in the source dataset, and put into operation transaction truncation for attain the lowest information defeat. We lastly add the Laplace noise for frequent item sets to make certain privacy guarantees.


References


Z. John Lu, “The elements of statistical learning: data mining, inference,and prediction,” Journal of the Royal Statistical Society: Series A(Statistics in Society), vol. 173, no. 3, pp. 693–694, 2010.

U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, “From data mining toknowledge discovery in databases,” AI magazine, vol. 17, no. 3, p. 37,1996.

H. Yang, K. Huang, I. King, and M. R. Lyu, “Localized support vectorregression for time series prediction,” Neurocomputing, vol. 72, no. 10-12, pp. 2659–2669, 2009.

C. Romero and S. Ventura, “Educational data mining: A review of thestate of the art,” IEEE Transactions on Systems, Man, and Cybernetics,Part C (Applications and Reviews), vol. 40, pp. 601–618, Nov 2010.

J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques.Elsevier, 2011.

X. Fang, Y. Xu, X. Li, Z. Lai, and W. K. Wong, “Robust semi-supervisedsubspace clustering via non-negative low-rank representation,” IEEETransactions on Cybernetics, vol. 46, pp. 1828–1838, Aug 2016.

M. Pe˜na, F. Biscarri, J. I. Guerrero, I. Monedero, and C. Le´on, “Rulebasedsystem to detect energy efficiency anomalies in smart buildings,a data mining approach,” Expert Systems with Applications, vol. 56,pp. 242–255, 2016.

Y. Guo, F. Wang, B. Chen, and J. Xin, “Robust echo state networksbased on correntropy induced loss function,” Neurocomputing, vol. 267,pp. 295–303, 2017.

H. Lim and H.-J. Kim, “Item recommendation using tag emotion insocial cataloging services,” Expert Systems with Applications, vol. 89,pp. 179–187, 2017.

R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang, “(_, k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing,”in Proceedings of the 12th ACM SIGKDD International Conference onKnowledge Discovery and Data Mining, pp. 754–759, ACM, 2006.

L. Sweeney, “k-anonymity: A model for protecting privacy,” InternationalJournal of Uncertainty, Fuzziness and Knowledge-Based Systems,vol. 10, no. 05, pp. 557–570, 2002.

S. Latanya, “Achieving k-anonymity privacy protection using generalization and suppression,” International Journal of Uncertainty, Fuzzinessand Knowledge-Based Systems, vol. 10, no. 05, pp. 571–588, 2002.

A. Meyerson and R. Williams, “On the complexity of optimal kanonymity,”in Proceedings of the Twenty-third ACM SIGMOD-SIGACTSIGARTSymposium on Principles of Database Systems, pp. 223–228,ACM, 2004.

Y. Zhang, J. Zhou, F. Chen, L. Y. Zhang, K. Wong, X. He, andD. Xiao, “Embedding cryptographic features in compressive sensing,”Neurocomputing, vol. 205, pp. 472–480, 2016.

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramani“l-diversity: Privacy beyond k-anonymity,” ACM Transactions onKnowledge Discovery from Data (TKDD), vol. 1, no. 1, p. 3, 2007.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.