Privacy-Preserving Two-Party k-Means Clustering in Malicious Model

被引:6
|
作者
Akhter, Rahena [1 ]
Chowdhury, Rownak Jahan [1 ]
Emura, Keita [2 ]
Islam, Tamzida [1 ]
Rahman, Mohammad Shahriar [1 ]
Rubaiyat, Nusrat [1 ]
机构
[1] UAP, Dept CSE, Dhaka, Bangladesh
[2] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
k-means clustering; privacy-preserving; malicious model; threshold two-party computation;
D O I
10.1109/COMPSACW.2013.53
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacypreserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 50 条
  • [21] A reversible privacy-preserving clustering technique based on k-means algorithm
    Lin, Chen-Yi
    APPLIED SOFT COMPUTING, 2020, 87
  • [22] Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
    Su, Chunhua
    Bao, Feng
    Zhou, Jianying
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (04) : 1246 - 1250
  • [23] Privacy-Preserving and Outsourced Multi-User k-Means Clustering
    Rao, Fang-Yu
    Samanthula, Bharath K.
    Bertino, Elisa
    Yi, Xun
    Liu, Dongxi
    2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 80 - 89
  • [24] Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
    El Omri, Othmane
    Boudguiga, Aymen
    Izabachene, Malika
    Klaudel, Witold
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 685 - 696
  • [25] Outsourced and Privacy-Preserving K-means Clustering Scheme for Smart Grid
    Shen, Xielin
    Yuan, Bo
    Peng, Weiwen
    Qian, Yuanquan
    Wu, Yonghua
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 307 - 313
  • [26] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [27] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250
  • [28] Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme
    Patel, Sankita
    Sonar, Mitali
    Jinwala, Devesh C.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2014, 5 (02) : 44 - 70
  • [29] Efficient Privacy Preserving K-Means Clustering
    Upmanyu, Maneesh
    Namboodiri, Anoop M.
    Srinathan, Kannan
    Jawahar, C. V.
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 154 - 166
  • [30] Privacy Preserving Approximate K-means Clustering
    Biswas, Chandan
    Ganguly, Debasis
    Roy, Dwaipayan
    Bhattacharya, Ujjwal
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 1321 - 1330