Privacy-Preserving Two-Party k-Means Clustering in Malicious Model

被引:6
|
作者
Akhter, Rahena [1 ]
Chowdhury, Rownak Jahan [1 ]
Emura, Keita [2 ]
Islam, Tamzida [1 ]
Rahman, Mohammad Shahriar [1 ]
Rubaiyat, Nusrat [1 ]
机构
[1] UAP, Dept CSE, Dhaka, Bangladesh
[2] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
k-means clustering; privacy-preserving; malicious model; threshold two-party computation;
D O I
10.1109/COMPSACW.2013.53
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacypreserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 50 条
  • [1] Privacy of outsourced two-party k-means clustering
    Cai, Yunlu
    Tang, Chunming
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (08):
  • [2] Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
    Jiang, Zoe L.
    Guo, Ning
    Jin, Yabin
    Lv, Jiazhuo
    Wu, Yulin
    Liu, Zechao
    Fang, Junbin
    Yiu, S. M.
    Wang, Xuan
    INFORMATION SCIENCES, 2020, 518 : 168 - 180
  • [3] Outsourcing Two-party Privacy Preserving K-means Clustering Protocol In Wireless Sensor Networks
    Liu, Xiaoyan
    Jiang, Zoe L.
    Yiu, S. M.
    Wang, Xuan
    Tan, Chuting
    Li, Ye
    Liu, Zechao
    Jin, Yabin
    Fang, Junbin
    2015 11TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2015, : 124 - 133
  • [4] Two-party privacy-preserving agglomerative document clustering
    Su, Chunhua
    Zhou, Jianying
    Bao, Feng
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 193 - +
  • [5] Secure Two-Party k-Means Clustering
    Bunn, Paul
    Ostrovsky, Rafail
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 486 - 497
  • [6] PPMCK: Privacy-preserving multi-party computing for K-means clustering
    Fan, Yongkai
    Bai, Jianrong
    Lei, Xia
    Lin, Weiguo
    Hu, Qian
    Wu, Guodong
    Guo, Jiaming
    Tan, Gang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 154 (154) : 54 - 63
  • [7] Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing
    Jiang, Zoe L.
    Guo, Ning
    Jin, Yabin
    Lv, Jiazhuo
    Wu, Yulin
    Yu, Yating
    Wang, Xuan
    Yiu, S. M.
    Fang, Junbin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 447 - 460
  • [8] Privacy-Preserving K-Means Clustering Upon Negative Databases
    Hu, Xiaoyi
    Lu, Liping
    Zhao, Dongdong
    Xiang, Jianwen
    Liu, Xing
    Zhou, Haiying
    Xiong, Shengwu
    Tian, Jing
    NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV, 2018, 11304 : 191 - 204
  • [9] Importance of Data Standardization in Privacy-Preserving K-Means Clustering
    Su, Chunhua
    Zhan, Justin
    Sakurai, Kouichi
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2009, 5667 : 276 - +
  • [10] Oblivious Sampling with Applications to Two-Party k-Means Clustering
    Paul Bunn
    Rafail Ostrovsky
    Journal of Cryptology, 2020, 33 : 1362 - 1403