Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering

Abedelaziz Mohaisen, Dowon Hong
2008 ETRI Journal  
ABSTRACT⎯The rotation-based transformation (RBT) for privacy preserving data mining is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple-rotation-based transformation technique for special mining applications, mitigating the ICA attack while maintaining the advantages of the RBT.
doi:10.4218/etrij.08.0208.0134 fatcat:rxlqaxgfzzfcvluodutv6yvt6e