z-logo
open-access-imgOpen Access
Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding
Author(s) -
Menaga D.,
Revathi S.
Publication year - 2018
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2017.0634
Subject(s) - key (lock) , computer science , association rule learning , data mining , key generation , confidentiality , algorithm , function (biology) , computer security , cryptography , evolutionary biology , biology
Privacy preserving data mining (PPDM) is a well‐known research area, which can analyse the database ensuring privacy such that it does not expose the confidential details. This study proposes a technique of secret key generation for privacy preserving using the least lion optimisation algorithm (LLOA). The proposed algorithm involves two stages: rule mining and secret key generation for the sanitisation. Initially, whale optimisation algorithm mines the association rules for the input database and validates the rules with the newly formulated fitness function. An algorithm, LLOA is developed by modifying the lion optimisation algorithm (LOA) with the inclusion of least mean square (LMS) which generates a secret key to provide privacy in mining. With the secret key, LLOA converts the original database into the sanitised database. Then, the algorithm optimally selects a secret key such that the sanitised database hides sensitive information by the utilisation of two factors, namely, privacy factor and utility factor, in its objective function. From the results, it can be shown that the LLOA technique attains the privacy of 84.36, 83.74, and 82.46%; and utility of 81.37, 83.96, and 81.37%, for chess, T10I4D100K, and retail datasets.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here