Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering

نویسندگان

  • Aziz Mohaisen
  • Dowon Hong
چکیده

The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering

© 2010 Dowon Hong et al. 351 Multiple rotation-based transformation (MRBT) was introduced recently for mitigating the apriori-knowledge independent component analysis (AK-ICA) attack on rotation-based transformation (RBT), which is used for privacy-preserving data clustering. MRBT is shown to mitigate the AK-ICA attack but at the expense of data utility by not enabling conventional clustering. ...

متن کامل

A Random Rotation Perturbation Approach to Privacy Preserving Data Classification

This paper presents a random rotation perturbation approach for privacy preserving data classification. Concretely, we identify the importance of classification-specific information with respect to the loss of information factor, and present a random rotation perturbation framework for privacy preserving data classification. Our approach has two unique characteristics. First, we identify that m...

متن کامل

SVD based Data Transformation Methods for Privacy Preserving Clustering

Nowadays privacy issues are major concern for many government and other private organizations to delve important information from large repositories of data. Privacy preserving clustering which is one of the techniques emerged to addresses the problem of extracting useful clustering patterns from distorted data without accessing the original data directly. In this paper two hybrid data transfor...

متن کامل

Privacy Preserving Clustering Based on Fuzzy Data Transformation Methods

Knowledge extraction process poses certain problems like accessing sensitive, personal or business information. Privacy invasion occurs owing to the abuse of personal information. Hence privacy issues are challenging concern of the data miners. Privacy preservation is a complex task as it ensures the privacy of individuals without losing the accuracy of data mining results. In this paper, fuzzy...

متن کامل

A Robust Privacy-Preserving Recommendation Algorithm

Privacy-preserving collaborative filtering schemes are key recommender system technologies for e-commerce field. They focus on alleviating information overload problem by providing personalized recommendations without deeply jeopardizing customers’ privacy. Like their non-private versions, privacy-preserving recommendation methods might be easily subjected to profile injection attacks for manip...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0906.0202  شماره 

صفحات  -

تاریخ انتشار 2009