Abstract
Privacy preservation is widely talked in recent years, which prevents the disclosure of sensitive information during the knowledge discovery. There are many applications of distributed scenario which includes retail shops, where the stream of digital data is collected from time to time. The collaborating parties are generally interested in finding global patterns for their mutual benefits. There are few proposals which address these issues, but in the existing methods, global pattern computation is carried out by one of the source itself and uses one offset to perturb the personal data which fails in many situations such as all the patterns are not initiated at the initial participating party. Our novel approach addresses these problems for retail shops in strategic way by considering the different offsets to perturb the sensitive information and trusted third party to ensure global pattern computation.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Huang, J.-W., Tseng, C.-Y., Ou, J.-C., Chen, M.-S.: A General Model for Sequential Pattern Mining with a Progressive Database. International Journal of Knowledge and Data Engineering 20, 1153–1167 (2008)
Mhatre, A., Verma, M., Toshniwal, D.: Privacy Preserving Sequential Pattern Mining in Progressive Databases using Noisy Data. In: International Conference on Information Visualization, pp. 456–460 (2009)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM SIGMOD Conference on Management of Data, New York, USA, pp. 439–450 (2000)
Samarati, P.: Protecting Respondents’ Identities in Micro data Release. IEEE Trans. Knowledge Data Eng. 13(6), 1010–1027 (2001)
Fung, B., Wang, K., Yu, P.: Top-Down Specialization for Information and Privacy Preservation. In: ICDE Conference, pp. 205–216 (2005)
LeFevre, K., De Witt, D., Ramakrishnan, R.: Incognito: Full Domain K-Anonymity. In: ACM SIGMOD Conference, Maryland, pp. 49–60 (2005)
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional K-Anonymity. In: ICDE Conference, pp. 25–25 (2006)
Park, H., Shim, K.: Approximate Algorithms for K-anonymity. In: ACM SIGMOD Conference, Beijing, China, pp. 67–78 (2007)
Wang, K., Yu, P., Chakraborty, S.: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. In: ICDM Conference, pp. 249–256 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
B.N., K., Toshniwal, D. (2011). Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-17881-8_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17880-1
Online ISBN: 978-3-642-17881-8
eBook Packages: Computer ScienceComputer Science (R0)