Business Intelligence

Mitigating the ICA Attack Against Rotation Based Transformation for Privacy Preserving Clustering

Download Now Free registration required

Executive Summary

While it is important for data owners to publish their data to a third party for providing data mining services, the privacy of the data itself needs to be maintained. Therefore, several perturbation methods have been introduced considering potential applications. One of these methods is the Rotation Based Transformation (RBT) in which the data is transformed geometrically while preserving the distance between the data points. Such distance-preservation is vital for providing a high accuracy that reflexes a minimal data loss when performing data clustering.

  • Format: PDF
  • Size: 123.9 KB