{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:13:10Z","timestamp":1759133590414,"version":"3.41.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T00:00:00Z","timestamp":1489017600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s40537-017-0064-9","type":"journal-article","created":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T14:59:54Z","timestamp":1489071594000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Scalable two-phase co-occurring sensitive pattern hiding using MapReduce"],"prefix":"10.1186","volume":"4","author":[{"given":"Shivani","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Durga","family":"Toshniwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,9]]},"reference":[{"issue":"2","key":"64_CR1","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, Yang LT, Liu C, Chen J. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Trans Parallel Distrib Syst. 2014;25(2):363\u201373.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"64_CR2","doi-asserted-by":"crossref","unstructured":"Liu F, Shu X, Yao D, Butt AR. Privacy-preserving scanning of big content for sensitive data exposure with MapReduce. In: Proceedings of the 5th ACM conference on data and application Security and Privacy. New York: ACM; 2015. p. 195\u20136.","DOI":"10.1145\/2699026.2699106"},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Yi X, Rao FY, Bertino E, Bouguettaya A. Privacy-preserving association rule mining in cloud computing. In: Proceedings of the 10th ACM symposium on information, computer and communications security. New York: ACM; 2015. p. 439\u201350.","DOI":"10.1145\/2714576.2714603"},{"key":"64_CR4","doi-asserted-by":"crossref","unstructured":"Huang C, Lu R. EFPA: efficient and flexible privacy-preserving mining of association rule in cloud. In 2015 IEEE\/CIC international conference on communications in China (ICCC). New York: IEEE; 2015. p. 1\u20136.","DOI":"10.1109\/ICCChina.2015.7448753"},{"key":"64_CR5","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.future.2013.06.011","volume":"30","author":"J Li","year":"2014","unstructured":"Li J, Li J, Chen X, Liu Z, Jia C. Privacy-preserving data utilization in hybrid clouds. Fut Gener Comput Syst. 2014;30:98\u2013106.","journal-title":"Fut Gener Comput Syst"},{"key":"64_CR6","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV. Security and privacy for storage and computation in cloud computing. Inf Sci. 2014;258:371\u201386.","journal-title":"Inf Sci"},{"key":"64_CR7","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.future.2015.11.006","volume":"62","author":"Z Yan","year":"2016","unstructured":"Yan Z, Ding W, Niemi V, Vasilakos AV. Two schemes of privacy-preserving trust evaluation. Fut Gener Comput Syst. 2016;62:175\u201389.","journal-title":"Fut Gener Comput Syst"},{"key":"64_CR8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean J, Ghemawat S. MapReduce: simplified data processing on large clusters. Commun ACM. 2008;51:107\u201313.","journal-title":"Commun ACM."},{"key":"64_CR9","unstructured":"Oliveira SR, Zaiane OR. Privacy preserving frequent itemset mining. In: Proceedings of the IEEE international conference on privacy, security and data mining. Australian Computer Society, Inc.., 2002. Vol. 14, p. 43\u201354."},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Oliveira SR, Za\u00efane OR. Protecting sensitive knowledge by data sanitization. New York: ICDM; 2003. Vol. 3, pp. 613\u201316.","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Atallah M, Bertino E, Elmagarmid A, Ibrahim M, Verykios V. Disclosure limitation of sensitive rules. In: 1999 Workshop on knowledge and data engineering exchange, (KDEX\u201999) Proceedings. 1999. p. 45\u201352.","DOI":"10.1109\/KDEX.1999.836532"},{"issue":"1","key":"64_CR12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.dss.2006.08.007","volume":"43","author":"A Amiri","year":"2007","unstructured":"Amiri A. Dare to share: protecting sensitive knowledge with data sanitization. Decis Support Syst. 2007;43(1):181\u201391.","journal-title":"Decis Support Syst"},{"key":"64_CR13","doi-asserted-by":"crossref","unstructured":"Zhang X, Liu C, Nepal S, Yang C, Chen J. Privacy preservation over big data in cloud systems. In: Security, Privacy and Trust in Cloud Systems. Berlin: Springer; 2014. p. 239\u201357.","DOI":"10.1007\/978-3-642-38586-5_8"},{"key":"64_CR14","doi-asserted-by":"crossref","unstructured":"Dasseni E, Verykios VS, Elmagarmid AK, Bertino E. Hiding association rules by using confidence and support. In: International workshop on information hiding. Berlin: Springer; 2001. p. 369\u2013383.","DOI":"10.1007\/3-540-45496-9_27"},{"issue":"4","key":"64_CR15","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios VS, Elmagarmid AK, Bertino E, Saygin Y, Dasseni E. Association rule hiding. IEEE Trans Knowl Data Eng. 2004;16(4):434\u201347.","journal-title":"IEEE Trans Knowl Data Eng."},{"key":"64_CR16","doi-asserted-by":"crossref","unstructured":"Bhandarkar M. MapReduce programming with apache Hadoop. In: IEEE international symposium on parallel and distributed processing (IPDPS), 2010. New York: IEEE; 2010.","DOI":"10.1109\/IPDPS.2010.5470377"},{"issue":"11","key":"64_CR17","doi-asserted-by":"crossref","first-page":"2114","DOI":"10.1109\/JPROC.2016.2591592","volume":"104","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Cao T, Li S, Tian X, Yuan L, Jia H, Vasilakos AV. Parallel processing systems for big data: a survey. Proc IEEE. 2016;104(11):2114.","journal-title":"Proc IEEE"},{"key":"64_CR18","doi-asserted-by":"crossref","unstructured":"Fung BC, Wang K, Yu PS. Top-down specialization for information and privacy preservation. In: 21st international conference on data engineering (ICDE\u201905). New York: IEEE; 2005.","DOI":"10.1109\/ICDE.2005.143"},{"key":"64_CR19","doi-asserted-by":"crossref","unstructured":"Sharma S, Toshniwal D. Parallelization of association rule mining: survey. In: International conference on computing, communication and security (ICCCS). New York: IEEE; 2015. p. 1\u20136.","DOI":"10.1109\/CCCS.2015.7374209"},{"key":"64_CR20","unstructured":"The transactional data provided for acquire valued shoppers challenge. https:\/\/www.kaggle.com\/c\/acquire-valued-shoppers-challenge\/data . Accessed 7 Oct 2016."}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-017-0064-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40537-017-0064-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-017-0064-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T14:15:36Z","timestamp":1750083336000},"score":1,"resource":{"primary":{"URL":"http:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-017-0064-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,9]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["64"],"URL":"https:\/\/doi.org\/10.1186\/s40537-017-0064-9","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2017,3,9]]},"article-number":"4"}}