Hiding sensitive itemsets in shared transactional databases: Minimizing the number of items removed

Syam Menon, Abhijeet Ghoshal, Sumit Sarkar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Firms have been sharing transactional data with business partners for decades. The benefits of sharing not withstanding, a significant number of firms are still reluctant to share, for fear of sensitive information getting into the wrong hands. Consequently, effective ways to hide sensitive information before sharing data has become an important consideration. As most versions of the underlying problem are NP-hard, and as transactional databases involve millions of transactions, research on this topic has also been ongoing for many years. In this paper, we explore hiding sensitive itemsets while minimizing the number of items removed from the database to achieve it. We present an integer programming formulation, and show that while the general problem is NP-hard, there is underlying structure in the problem that allows it to be decomposed and solved more efficiently. We illustrate various aspects of the problem using examples, and present a solution procedure based on propositions developed in the paper. This is research in progress, and we intend to implement and illustrate the effectiveness of the proposed procedure on large, real and synthetic databases involving millions of transactions.

Original languageEnglish (US)
Title of host publication40th International Conference on Information Systems, ICIS 2019
PublisherAssociation for Information Systems
ISBN (Electronic)9780996683197
StatePublished - Jan 1 2020
Event40th International Conference on Information Systems, ICIS 2019 - Munich, Germany
Duration: Dec 15 2019Dec 18 2019

Publication series

Name40th International Conference on Information Systems, ICIS 2019

Conference

Conference40th International Conference on Information Systems, ICIS 2019
Country/TerritoryGermany
CityMunich
Period12/15/1912/18/19

Keywords

  • Accuracy
  • Integer programming
  • Privacy

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Hiding sensitive itemsets in shared transactional databases: Minimizing the number of items removed'. Together they form a unique fingerprint.

Cite this