{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:15:35Z","timestamp":1759133735925,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s10489-020-01749-6","type":"journal-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T06:15:35Z","timestamp":1594793735000},"page":"4241-4260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["MR-OVnTSA: a heuristics based sensitive pattern hiding approach for big data"],"prefix":"10.1007","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6652-2651","authenticated-orcid":false,"given":"Shivani","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Durga","family":"Toshniwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,15]]},"reference":[{"key":"1749_CR1","doi-asserted-by":"crossref","unstructured":"Verykios VS, Gkoulalas-Divanis A (2008) A survey of association rule hiding methods for privacy. In: Privacy-preserving data mining, pp 267\u2013289","DOI":"10.1007\/978-0-387-70992-5_11"},{"key":"1749_CR2","doi-asserted-by":"crossref","unstructured":"Tsai Y-C, Wang S-L, Song C-Y, Ting I (2016) Privacy and utility effects of k-anonymity on association rule hiding. In: Proceedings of the the 3rd multidisciplinary international social networks conference on social informatics, data science 2016, p 42","DOI":"10.1145\/2955129.2955169"},{"key":"1749_CR3","doi-asserted-by":"crossref","unstructured":"Jin Y, Su C, Ruan N, Jia W (2016) Privacy-preserving mining of association rules for horizontally distributed databases based on FP-tree. In: International conference on information security practice and experience, pp 300\u2013314","DOI":"10.1007\/978-3-319-49151-6_21"},{"key":"1749_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5","volume-title":"A general survey of privacy-preserving data mining models and algorithms, privacy-preserving data mining: models and algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal CC, Yu PS (2008) A general survey of privacy-preserving data mining models and algorithms, privacy-preserving data mining: models and algorithms. Springer, Boston, pp 11\u201352"},{"key":"1749_CR5","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.eswa.2017.10.048","volume":"96","author":"A Telikani","year":"2018","unstructured":"Telikani A, Shahbahrami A (2018) Data sanitization in association rulemining: an analytical review. Expert Syst Appl 96:406\u2013 426","journal-title":"Expert Syst Appl"},{"issue":"4","key":"1749_CR6","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios VS, Elmagarmid AK, Bertino E, Saygin Y, Dasseni E (2004) Association rule hiding. IEEE Trans Knowl Data Eng 16(4):434\u2013447","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1749_CR7","unstructured":"Oliveira SRM, Zaiane OR (2002) Privacy preserving frequent itemset mining. In: Proceedings of the IEEE international conference on privacy, security and data mining, vol 14, pp 43\u201354"},{"key":"1749_CR8","unstructured":"Atallah M, Bertino E, Elmagarmid A, Ibrahim M, Verykios V (1999) Disclosure limitation of sensitive rules. In: IEEE workshop on knowledge and data engineering exchange (KDEX\u201999) Proceedings, pp 45\u201352"},{"key":"1749_CR9","doi-asserted-by":"crossref","unstructured":"Saygin Y, Verykios VS, Elmagarmid AK (2002) Privacy preserving association rule mining. In: Twelfth international workshop on research issues in data engineering: engineering e-commerce\/e-business systems RIDE-2EC proceedings, pp 151\u2013158","DOI":"10.1109\/RIDE.2002.995109"},{"key":"1749_CR10","doi-asserted-by":"crossref","unstructured":"Oliveira SRM, Za\u00efane O R (2003) Protecting sensitive knowledge by data sanitization. In: ICDM, vol 3, pp 613\u2013616","DOI":"10.1109\/ICDM.2003.1250990"},{"issue":"1","key":"1749_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.dss.2006.08.007","volume":"43","author":"A Amiri","year":"2007","unstructured":"Amiri A (2007) Dare to share: protecting sensitive knowledge with data sanitization. Decis Support Syst 43(1):181\u2013191","journal-title":"Decis Support Syst"},{"key":"1749_CR12","doi-asserted-by":"crossref","unstructured":"Dasseni E, Verykios VS, Elmagarmid AK, Bertino E (2001) Hiding association rules by using confidence and support. In: Proceedings of the 4th international workshop on information hiding, pp 369\u2013383","DOI":"10.1007\/3-540-45496-9_27"},{"issue":"1","key":"1749_CR13","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/TKDE.2007.250583","volume":"19","author":"Y-H Wu","year":"2007","unstructured":"Wu Y-H, Chiang C-M, Chen ALP (2007) Hiding sensitive association rules with limited side effects. IEEE Trans Knowl Data Eng 19(1):29\u201342","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"1749_CR14","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10489-015-0671-0","volume":"44","author":"P Cheng","year":"2016","unstructured":"Cheng P, Roddick JF, Chu SC, Lin CW (2016) Privacy preservation through a greedy, distortion-based rule-hiding method. Appl Intell 44(2):295\u2013306","journal-title":"Appl Intell"},{"key":"1749_CR15","unstructured":"http:\/\/fimi.ua.ac.be\/data\/ (Accessed 17 Nov 2016)"},{"key":"1749_CR16","unstructured":"https:\/\/sourceforge.net\/projects\/ibmquestdatagen\/ (Accessed 10 April 2016)"},{"key":"1749_CR17","unstructured":"https:\/\/www.kaggle.com\/c\/acquire-valued-shoppers-challenge\/data (Accessed 7 Oct 2016)"},{"key":"1749_CR18","unstructured":"Sharma S, Toshniwal D (2011) Parallelization of association rule mining: survey. In: International conference on computing, communication and security (ICCCS), pp 1\u20136"},{"key":"1749_CR19","doi-asserted-by":"crossref","unstructured":"Bhandarkar M (2010) Mapreduce programming with apache Hadoop. In: IEEE international symposium on parallel & distributed processing (IPDPS)","DOI":"10.1109\/IPDPS.2010.5470377"},{"key":"1749_CR20","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis A, Verykios VS (2006) An integer programming approach for frequent itemset hiding. In: Proceeding of the ACM conference on information and knowledge management (CIKM \u201906), pp 748\u2013757","DOI":"10.1145\/1183614.1183721"},{"issue":"1","key":"1749_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10095020.2018.1545884","volume":"22","author":"N Sari Aslam","year":"2019","unstructured":"Sari Aslam N, Cheng T, Cheshire J (2019) A high-precision heuristic model to detect home and work locations from smart card data. Geo-spatial Information Science 22(1):1\u201311","journal-title":"Geo-spatial Information Science"},{"issue":"3","key":"1749_CR22","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1049\/trit.2019.0053","volume":"4","author":"X Zhao","year":"2019","unstructured":"Zhao X, Gong M, Zuo X, Pan L (2019) Guest editorial: advances in bio-inspired heuristics for computing. CAAI Transactions on Intelligence Technology 4(3):127\u2013128","journal-title":"CAAI Transactions on Intelligence Technology"},{"key":"1749_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10674-4","volume-title":"Feature selection and enhanced krill herd algorithm for text document clustering","author":"LMQ Abualigah","year":"2019","unstructured":"Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin"},{"key":"1749_CR24","doi-asserted-by":"crossref","unstructured":"Lin CW, Hong TP, Wong JW, Lan GC, Lin WY (2014) A GA-based approach to hide sensitive high utility itemsets. Sci World J, vol 2014","DOI":"10.1155\/2014\/804629"},{"key":"1749_CR25","doi-asserted-by":"crossref","unstructured":"Lin CW, Zhang B, Yang KT, Hong TP (2014) Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci World J, vol 2014","DOI":"10.1155\/2014\/398269"},{"issue":"2","key":"1749_CR26","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/s10489-014-0590-5","volume":"42","author":"CW Lin","year":"2014","unstructured":"Lin CW, Hong TP, Yang KT, Wang SL (2014) The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl Intell 42(2):210\u2013230","journal-title":"Appl Intell"},{"key":"1749_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2016.03.007","volume":"53","author":"CW Lin","year":"2016","unstructured":"Lin CW, Liu Q, Fournier-Viger P, Hong TP, Voznak M, Zhan J (2016) A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng Appl Artif Intell 53:1\u201318","journal-title":"Eng Appl Artif Intell"},{"key":"1749_CR28","doi-asserted-by":"crossref","unstructured":"Lin JC-W, Zhang Y, Chen C-H, Wu JM-T, Chen C-M, Hong T-P (2018) A multiple objective PSO-based approach for data sanitization. In: 2018 conference on technologies and applications of artificial intelligence (TAAI). IEEE, pp 148\u2013151","DOI":"10.1109\/TAAI.2018.00039"},{"key":"1749_CR29","doi-asserted-by":"crossref","unstructured":"Pontikakis ED, Tsitsonis AA, Verykios VS (2004) An experimental study of distortion-based techniques for association rule hiding. In: Proceedings of the 18th conference on database security (DBSEC 2004), pp 325\u2013339","DOI":"10.1007\/1-4020-8128-6_22"},{"issue":"4","key":"1749_CR30","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y Saygin","year":"2001","unstructured":"Saygin Y, Verykios VS, Clifton C (2001) Using unknowns to prevent discovery of association rules. ACM SIGMOD Record 30(4):45\u201354","journal-title":"ACM SIGMOD Record"},{"key":"1749_CR31","doi-asserted-by":"crossref","unstructured":"Saygin Y, Verykios VS, Elmagarmid AK (2002) Privacy preserving association rule mining. In: Proceedings of the 2002 international workshop on research issues in data engineering: engineering e-commerce\/e-business systems (RIDE 2002), pp 151\u2013163","DOI":"10.1109\/RIDE.2002.995109"},{"key":"1749_CR32","doi-asserted-by":"crossref","unstructured":"Wang S-L, Jafari A (2005) Using unknowns for hiding sensitive predictive association rules. In: Proceedings of the 2005 IEEE international conference on information reuse and integration (IRI 2005), pp 223\u2013228","DOI":"10.1109\/IRI-05.2005.1506477"},{"key":"1749_CR33","doi-asserted-by":"crossref","unstructured":"Pontikakis E, Theodoridis Y, Tsitsonis A, Chang L, Verykios VS (2004) A quantitative and qualitative analysis of blocking in association rule hiding. In: Proceedings of the 2004 ACM workshop on privacy in the electronic society (WPES 2004), pp 29\u201330","DOI":"10.1145\/1029179.1029187"},{"issue":"5","key":"1749_CR34","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TKDE.2008.199","volume":"21","author":"A Gkoulalas-Divanis","year":"2009","unstructured":"Gkoulalas-Divanis A, Verykios VS (2009) Exact knowledge hiding through database extension. IEEE Trans Knowl Data Eng 21(5):699\u2013713","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1749_CR35","unstructured":"Sun X, Philip SY (2005) A border-based approach for hiding sensitive frequent itemsets. In: Null. IEEE, pp 426\u2013433"},{"issue":"1","key":"1749_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.datak.2007.06.012","volume":"65","author":"GV Moustakides","year":"2008","unstructured":"Moustakides GV, Verykios VS (2008) A MaxMin approach for hiding frequent itemsets. Data Knowl Eng 65(1):75\u201389","journal-title":"Data Knowl Eng"},{"key":"1749_CR37","unstructured":"Sharma S, Toshniwal D (2018) MR-I MaxMin-scalable two-phase border based knowledge hiding technique using mapreduce. Future Generation Computer Systems"},{"issue":"3","key":"1749_CR38","doi-asserted-by":"publisher","first-page":"495","DOI":"10.3233\/IDA-160817","volume":"20","author":"P Chen","year":"2016","unstructured":"Chen P, Lee I, Lin CW, Pan JS (2016) Association rule hiding based on evolutionary multi-objective optimization. Intelligent Data Analysis 20(3):495\u2013514","journal-title":"Intelligent Data Analysis"},{"key":"1749_CR39","doi-asserted-by":"crossref","unstructured":"Al-Sai ZA, Abualigah LM (2017) Big data and e-government: a review. In: 2017 8th international conference on information technology (ICIT). IEEE, pp 580\u2013587","DOI":"10.1109\/ICITECH.2017.8080062"},{"issue":"1","key":"1749_CR40","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s40537-017-0064-9","volume":"4","author":"S Sharma","year":"2017","unstructured":"Sharma S, Toshniwal D (2017) Scalable two-phase co-occurring sensitive pattern hiding using MapReduce. Journal of Big Data 4(1):4","journal-title":"Journal of Big Data"},{"key":"1749_CR41","doi-asserted-by":"crossref","unstructured":"Hong TP, Lin CW, Yang KT, Wang SL (2011) June. A heuristic data-sanitization approach based on TF-IDF. In: International conference on industrial, engineering and other applications of applied intelligent systems, pp 156\u2013164","DOI":"10.1007\/978-3-642-21822-4_17"},{"key":"1749_CR42","first-page":"12","volume":"2014","author":"C-W Lin","year":"2014","unstructured":"Lin C-W, Hong T-P, Hsu H-C (2014) Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci World J 2014:12. 235837","journal-title":"Sci World J"},{"issue":"2","key":"1749_CR43","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/s10489-017-0906-3","volume":"47","author":"A Telikani","year":"2017","unstructured":"Telikani A, Shahbahrami A (2017) Optimizing association rule hiding using combination of border and heuristic approaches. Appl Intell 47(2):544\u2013557","journal-title":"Appl Intell"},{"key":"1749_CR44","doi-asserted-by":"crossref","unstructured":"Yi X, Rao F-Y, Bertino E, Bouguettaya A (2015) Privacy-preserving association rule mining in cloud computing. In: Proceedings of the 10th ACM symposium on information, computer and communications security, pp 439\u2013450","DOI":"10.1145\/2714576.2714603"},{"key":"1749_CR45","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-38586-5_8","volume-title":"Privacy preservation over big data in cloud systems. Security, Privacy and Trust in Cloud Systems","author":"X Zhang","year":"2014","unstructured":"Zhang X, et al. (2014) Privacy preservation over big data in cloud systems. Security, Privacy and Trust in Cloud Systems. Springer, Berlin, pp 239\u2013257"},{"issue":"2","key":"1749_CR46","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, et al. (2014) A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems 25(2):363\u2013373","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1749_CR47","doi-asserted-by":"crossref","unstructured":"Huang C, Lu R (2015) EFPA: efficient and flexible privacy-preserving mining of association rule in cloud. In: IEEE\/CIC international conference on communications in China (ICCC)","DOI":"10.1109\/ICCChina.2015.7448753"},{"key":"1749_CR48","doi-asserted-by":"crossref","unstructured":"Liu F, Shu X, Yao D, Butt AR (2015) Privacy-preserving scanning of big content for sensitive data exposure with MapReduce. In: Proceedings of the 5th ACM conference on data and application security and privacy, pp 195\u2013206","DOI":"10.1145\/2699026.2699106"},{"key":"1749_CR49","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jcss.2016.12.005","volume":"89","author":"C Huang","year":"2016","unstructured":"Huang C, Lu R, Choo K-KR (2016) Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. J Comput Syst Sci 89:51\u201363","journal-title":"J Comput Syst Sci"},{"issue":"2","key":"1749_CR50","first-page":"131","volume":"3","author":"A Telikani","year":"2015","unstructured":"Telikani A, Shahbahrami A, Tavoli R (2015) Data sanitization in association rule mining based on impact factor. Journal of AI and Data Mining 3(2):131\u2013140","journal-title":"Journal of AI and Data Mining"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-01749-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-020-01749-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-01749-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:07:14Z","timestamp":1626307634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-020-01749-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,15]]},"references-count":50,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1749"],"URL":"https:\/\/doi.org\/10.1007\/s10489-020-01749-6","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2020,7,15]]},"assertion":[{"value":"15 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}