Privacy-preserving Association Rule Mining: Techniques and Applications
DOI:
https://doi.org/10.53032/tvcr/2025.v7n2.38Keywords:
Association rule mining, Cryptographic methods, Data anonymization, Differential privacy, Privacy protection, Privacy-preserving algorithms, Secure multi-party computation (SMC)Abstract
The goal of privacy-preserving association rule mining (PPARM) is to identify useful patterns in datasets while protecting sensitive data. Protecting privacy is essential in the big data era, particularly when handling private, sensitive, or financial information. Sensitive information may be exposed since traditional ARM algorithms like Apriori and FP-growth do not handle privacy concerns. This paper explores privacy-preserving techniques such as data anonymization, cryptographic methods, secure multi-party computation (SMC), and differential privacy. It examines the trade-offs between maintaining data utility and privacy, addressing challenges like scalability and efficiency. Real-world applications in healthcare, e-commerce, and finance are discussed, highlighting the importance of privacy. Emerging trends aim to develop advanced models that balance privacy with effective data analysis.
References
Han, J., Kamber, M., & Pei, J. (2011). Data Mining: Concepts and Techniques (3rd ed.). Morgan Kaufmann.
Privacy-Preserving Data Mining",Author: Charu C. Aggarwal, Publisher: Springer, 2007
Hossain, M. S. M., & Day, C. H. (2015). Privacy-Preserving Data Mining: New Models and Algorithms. Springer.
Takeda, T., & Kobayashi, H. (2009). Privacy-Preserving Data Mining: Models and Algorithms. Springer.
Atallah, M. J., & Lin, X. (2003). Data Mining for Privacy and Security. Springer.
Arasu, A., & Chaudhuri, S. (2004). Mining association rules with privacy constraints. IEEE Transactions on Knowledge and Data Engineering, 16(7), 1024–1037.
Stanley R. M. Oliveira and Osmar R. Zaiane, “Privacy preserving frequent itemset mining, In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002), pp.43–54.
Li, N., & Li, T. (2007). Secure multi-party computation for privacy-preserving data mining. Journal of Computer Security, 15(1), 57–88.
Ghinita, G., Kennes, E., & Kennes, R. (2015). Privacy-preserving association rule mining: A survey. ACM Computing Surveys, 47(1), 1–38.
Fung, B. C., Wang, K., & Yu, P. S. (2010). Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (CSUR), 42(4), 1-53.
"Privacy-Preserving Association Rule Mining: A Survey",Author: L. P. Shanmugam, S. R. Ramaswamy,Journal: International Journal of Computer Applications,Year: 2016
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in Proc. 20th Int. Conf. Very Large Data Bases (VLDB), Santiago, Chile, 1994, pp. 487–499.
Y. Lindell and B. Pinkas, "Privacy preserving data mining," in Proc. 20th Annual Int. Cryptology Conf. (CRYPTO 2000), Santa Barbara, CA, USA, 2000, pp. 36–54.
M. Zhu and Y. Liu, "Privacy-preserving data mining: Techniques and applications in healthcare," J. Biomed. Informatics, vol. 116, p. 103716, Jan. 2021.
Y. Zhang and D. Wang, "Privacy-preserving association rule mining using homomorphic encryption," in Proc. Int. Conf. Data Mining (ICDM), Nov. 2020, pp. 268–277.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 The Voice of Creative Research

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.