An Analysis on High Utility Mining in Privacy Preserving using Data Mining

DOI : 10.17577/IJERTV10IS010117

Download Full-Text PDF Cite this Publication

Text Only Version

An Analysis on High Utility Mining in Privacy Preserving using Data Mining

Dr. R. Kanimozhi

Idhaya College for Women, Kumbakonam

Abstract:- The Complete psychoanalysis of data mining among Big Data is along with the assessment of its relevance during the stage of its lifecycle resolves not merely to advantage researcher, to grow burly explore a theme and categorize gap in the meadow except also assist practitioners for Data Mining relevance scheme development. Data mining is clarified in this paper briefly with their topics and the main goal of High utility Itemset mining is to recognize the itemsets and the value of a given utility threshold. The data mining, High Utility Itemset mining is emerged as new research for analysis in the market, stock souk prediction, and for many applications that can be more recommended. Moreover, the main objective is considering the base on which the highest itemsets identify in utilities to get more profit, quantity, and other cost preferences. First, we represent the backdrop of the utility mining and data mining in privacy preserves utility mining then finally the other preliminaries problems of utility mining. This paper can give a general idea of new and hastily emerging privacy of research preserving in utility mining.

Keywords: Utility mining, privacy-preserving, sensitive hiding, privacy-preserving utility mining, decision rule mining


The enormous application of data mining technology has raised concern regarding secure information in opposition to the unauthorized right of entry, this could serve the main important objective of database safety and solitude. The data are distributed with the most essential significant of privacy and security. Some of the information is hiding from the public that we dont reveal, due the term of privacy associated with this data mining task. To most important consideration in privacy preservation is to provide a correct balance among knowledge discovery and solitude protection.

The widespread amount of individual data in which we followed by several commerce applications is mining using privacy-preserving in current years. Solitude preservation is receiving more and more decisive for upcoming improvement data mining method with incredible potential right of entry to the datasets has personal, perceptive, or private information. The growing concern on privacy reveal is one more classes on data mining, identified by privacy preserving data mining (PPDM). PPDM algorithm is made-up to conceal sensitive data by linking privacy defense mechanisms previous to executing data mining using algorithms.


Depends upon item sets with more usefulness similar to profits-based data mining refers to a high transactional database. Vincent S Tseng et al suggested two algorithms for the development of particular utility mining is UPGROWTH AND UPGROWTH+, the high utility itemsets are a more victorious method for prune candidate itemsets [1]. Sonal Tiwari et al recommended in his web mining solution for business application and intelligence to find out the unseen pattern in trade strategies for customers and data on the web [2]. Throughout-surfing patterns (TSPs) offer by Yao-Te Wang and Anthony J.T. Leeb show a well-organized move toward mining the pattern. The TSPs are extra communicative to appreciate the cause for all website visitors [3].


The mainstream of privacy-preserving data mining techniques applies changes which reduce the function of causal data when it applies to this data mining techniques or algorithms. Privacy concerns can keep away from the building of a central warehouse in dotted among more than a few places, no alone is permissible to transport their facts to added place [4]. Then problems are how the results are securely gained in the preserving solitude of data, not with the results of data mining. The major areas on the research have emerged in privacy preserving data mining because the aware informations on the World Wide Web is broad proliferation.

The expansion of Privacy Preserving Datas Mining is from Privacy-Preserving Utility mining, and then the utilities are expressed in the terms from profits and quantities. Here the chapter presents a survey of up-to-date Privacy preserving utility mining. This concept particularly summarizes that both techniques in advance and algorithms are evaluating in privacy- preserving techniques [6].

Figure: Shows the Privacy Preserving Utility Mining Algorithms

PPUM Algorithms

Data Types Techniques

Transactional Database

Sequence Data types Heuristic Base Approach (Item


Pattern-growth Based Approach (Item Sanitization)

The Figure shows the classification of Privacy-Preserving Utility Mining algorithms and it consists of several criteria that are techniques and data types. The first criterion is in the terms of techniques that consist of two main types First is Heuristic techniques as genetic algorithms to carry out the addition modify and deletion of quantitative sequence database [5]. And second is Pattern growth techniques based on this database of quantitative transaction database. All the algorithms are using to solve Privacy-Preserving Utility Mining problems by the specific method of Hiding every High Utility Patterns (HUPs) that could be found on the innovative database for the given smallest usefulness threshold.

Finally, the adviser cant discover this pattern in the outcome from the sterile database which is the worth of the identical parameter. Privacy-Preserving Utility Mining is the most preferred active researcher topic as important due to preserving policy. In the quantitative database consist of the hiding-aware informations are appearing, so as it could not be discovered by utility pattering mining algorithm [7]. Data cant be derived by the unauthorized person as release publicly shared with their entities, the confidential level user information is making by Privacy-Preserving Utility mining with ensure. In real- time system analytical research on Privacy-Preserving Utility Mining consists of many algorithms so as to are extra developing for modifying the original database i.e knowledge linger private and confidential data when the algorithms on data mining is applied [8].


PPUM has several challenges in research that must be considered to the both advantage and disadvantages in designing algorithms to solve them perfectly as considered first. The algorithms might have good recital for the metrics in certain, but other limitations for additional metrics [9]. This could be reaching the high recital for the most of certain metrics that could a task of proposing a approach in a nontrivial. Then finding the side belongings of algorithms with could be modifying the innovative database by cleansing is well as necessary. And the second challenges for reminiscence with run-time, and also data shared should handle every day process for several applications that could be designed for rate awake the process in sanitization [10]. For the year wise techniques of usefulness based mining is proposed for research in recent and it could be for new comers usage to utilize for performance in a better way.


This research in Privacy of Preserving usefulness Mining is the nearly everyone emerging theme in the data mining. The handling of this statistics mining is mostly hiding perceptive information (High Utility Patterns). Many approaches in Privacy-Preserving Utility Mining are surveyed about the technique and approach used for the databasefor the sensitive informations. Both algorithms are use to solved the Privacy Preserve Utility Mining problems, that is Heuristic-based and Pattern growth is mostly infrequent. This paper represents the key ideas about these algorithms are to be highlighted the handling of the metric. The research opportunities in this Preserving Utility Mining are discussed so for and enhanced in future also for perceptive informations in the quantitative deal and quantitative series database.


  1. Sivamathi Chokkalingam*, Vijayarani S** Utility Mining Algorithms – A Comparative Study, Article can be accessed online at

  2. V.S. Akshaya, Purusothaman, Business Intelligence as a Service in Analysis of Academic course, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 4 (2016) pp 2458-2467© Research India Publications.

  3. L.K.Joshila Grace and, Dr. V. Maheswari, Utility, Importance And Frequency Dependent Algorithm For Web Path Traversal Using Prefix Tree Data Structure, Journal of Theoretical and Applied Information Technology

  4. G. Kiruthika , Dr. V. Umarani, Privacy Preserving Techniques with Novel Tree Structure and Table for Utility Mining, International Journal of Advanced Research in Computer and Communication Engineering ISSN (Online) 2278-1021 Vol. 6, Issue 2, February 2017

  5. Duy-Tai Dinh , Van-Nam Huynh, Bac Le, Philippe Fournier-Viger, Ut Huynh, Quang-Minh Nguyen, A Survey of Privacy Preserving Utility Mining

  6. Ghouse Mohiyaddin Sharif G.M, Anooj Padmakumari Kunj Unni Nair Design And Development Of Novel Approach For Privacy Preservation Of Utility Patterns, International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume-3, Issue-10, Oct.- 2015

  7. Md Ilyas, Dhanraj Verma, Manoj kumar Deshpande, An Improved Data Utility Model For Privacy Preserving Data Mining Using Decision Tree Algorithm, International journal of scientific & technology research volume 9, issue 02, February 2020 ISSN 2277-8616.

  8. Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh and Mohammad Abdur Razzaque, A comprehensive review on privacy preserving data mining Aldeen et al. SpringerPlus (2015) 4:694 DOI 10.1186/s40064-015-1481-x

  9. Hina Vaghashia INDIAAmit Ganatra, A Survey: Privacy Preservation Techniques in Data Mining International Journal of Computer Applications (0975 8887) Volume 119 No.4, June 2015

  10. Xinjun Qi , Mingkui Zong, An Overview of Privacy Preserving Data Mining 2011 International Conference on Environmental Science and Engineering (ICESE 2011) Procedia Environmental Sciences 12 ( 2012 ) 1341 1347

Leave a Reply