2008
DOI: 10.4218/etrij.08.0208.0134
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering

Abstract: ABSTRACT⎯ The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(18 citation statements)
references
References 7 publications
1
17
0
Order By: Relevance
“…As an elementary representation, a 2×2 orthonormal matrix can be represented as R=f(θ)=[e ij ], where e ij = cosθ iff i=j, e ij = sinθ iff i<j, and e ij = -sinθ iff i>j. An aⅹa orthonormal matrix, where a is an even number, is expressed in terms of a 2×2 orthonormal matrix as a diagonal block matrix R = [R i ] where 1≤ i ≤ a/2 and R 1 = R 2 = … = R a/2 [4]. For odd numbers of attributes, the last attribute can be transformed manually with any other previously transformed attribute [5].…”
Section: A Rbtmentioning
confidence: 99%
See 4 more Smart Citations
“…As an elementary representation, a 2×2 orthonormal matrix can be represented as R=f(θ)=[e ij ], where e ij = cosθ iff i=j, e ij = sinθ iff i<j, and e ij = -sinθ iff i>j. An aⅹa orthonormal matrix, where a is an even number, is expressed in terms of a 2×2 orthonormal matrix as a diagonal block matrix R = [R i ] where 1≤ i ≤ a/2 and R 1 = R 2 = … = R a/2 [4]. For odd numbers of attributes, the last attribute can be transformed manually with any other previously transformed attribute [5].…”
Section: A Rbtmentioning
confidence: 99%
“…In spite of mitigating the AK-ICA attack, which is a great merit [4], the MRBT does not allow conventional clustering on data that belongs to two different subsets. To enable that, we introduce an ARBT for conventional clustering of transformed data and its privacy.…”
Section: B Mrbtmentioning
confidence: 99%
See 3 more Smart Citations