Privacy preserving k-means clustering in multi-party environment

被引:21
|
作者
Samet, Saeed [1 ]
Miri, Ali [1 ]
Orozco-Barbosa, Luis [2 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON K1N 6N5, Canada
[2] Univ Castilla La Mancha, Inst Invest Informat, Albacete 02071, Spain
关键词
data mining; clustering; classification; and association rules; mining methods and algorithms; security and privacy protection; distributed data structures;
D O I
10.5220/0002121703810385
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Extracting meaningful and valuable knowledge from databases is often done by various data mining algorithms. Nowadays, databases are distributed among two or more parties because of different reasons such as physical and geographical restrictions and the most important issue is privacy. Related data is normally maintained by more than one organization, each of which wants to keep its individual information private. Thus, privacy-preserving techniques and protocols are designed to perform data mining on distributed environments when privacy is highly concerned. Cluster analysis is a technique in data mining, by which data can be divided into some meaningful clusters, and it has an important role in different fields such as bio-informatics, marketing, machine learning, climate and medicine. k-means Clustering is a prominent algorithm in this category which creates a one-level clustering of data. In this paper we introduce privacy-preserving protocols for this algorithm, along with a protocol for Secure comparison, known as the Millionaires' Problem, as a sub-protocol, to handle the clustering of horizontally or vertically partitioned data among two or more parties.
引用
收藏
页码:381 / +
页数:2
相关论文
共 50 条
  • [1] Multi-Party Verifiable Privacy-Preserving Federated k-Means Clustering in Outsourced Environment
    Hou, Ruiqi
    Tang, Fei
    Liang, Shikai
    Ling, Guowei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] PPMCK: Privacy-preserving multi-party computing for K-means clustering
    Fan, Yongkai
    Bai, Jianrong
    Lei, Xia
    Lin, Weiguo
    Hu, Qian
    Wu, Guodong
    Guo, Jiaming
    Tan, Gang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 154 (154) : 54 - 63
  • [3] Privacy preserving clustering for multi-party
    Yang, Weijia
    Huang, Shangteng
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 213 - +
  • [4] Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption
    Zhang, Peng
    Huang, Teng
    Sun, Xiaoqiang
    Zhao, Wei
    Liu, Hongwei
    Lai, Shangqi
    Liu, Joseph K.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2348 - 2359
  • [5] Practical multi-party private collaborative k-means clustering
    Zhang, En
    Li, Huimin
    Huang, Yuchen
    Hong, Shuangxi
    Zhao, Le
    Ji, Congmin
    NEUROCOMPUTING, 2022, 467 : 256 - 265
  • [6] Efficient Privacy Preserving K-Means Clustering
    Upmanyu, Maneesh
    Namboodiri, Anoop M.
    Srinathan, Kannan
    Jawahar, C. V.
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 154 - 166
  • [7] Privacy Preserving Approximate K-means Clustering
    Biswas, Chandan
    Ganguly, Debasis
    Roy, Dwaipayan
    Bhattacharya, Ujjwal
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 1321 - 1330
  • [8] An Efficient Approach for Privacy Preserving Distributed K-Means Clustering in Unsecured Environment
    Shewale, Amit
    Keshavamurthy, B. N.
    Modi, Chirag N.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 425 - 431
  • [9] Privacy-Preserving Multi-Party Clustering: An Empirical Study
    Silva, Arlei
    Bellala, Gowtham
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 326 - 333
  • [10] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
    Akhter, Rahena
    Chowdhury, Rownak Jahan
    Emura, Keita
    Islam, Tamzida
    Rahman, Mohammad Shahriar
    Rubaiyat, Nusrat
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126