Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering

  • Received : 2008.05.19
  • Accepted : 2008.10.08
  • Published : 2008.12.31

Abstract

The rotation-based transformation (RBT) for privacy preserving data mining is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple-rotation-based transformation technique for special mining applications, mitigating the ICA attack while maintaining the advantages of the RBT.

Keywords