Privacy-Preserving Two-Party k-Means Clustering in Malicious Model

被引:6
|
作者
Akhter, Rahena [1 ]
Chowdhury, Rownak Jahan [1 ]
Emura, Keita [2 ]
Islam, Tamzida [1 ]
Rahman, Mohammad Shahriar [1 ]
Rubaiyat, Nusrat [1 ]
机构
[1] UAP, Dept CSE, Dhaka, Bangladesh
[2] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
k-means clustering; privacy-preserving; malicious model; threshold two-party computation;
D O I
10.1109/COMPSACW.2013.53
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacypreserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 50 条
  • [41] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Youwen Zhu
    Xingxin Li
    Peer-to-Peer Networking and Applications, 2020, 13 : 2272 - 2284
  • [42] Privacy Preserving Clustering: A k-Means Type Extension
    Li, Wenye
    NEURAL INFORMATION PROCESSING (ICONIP 2014), PT II, 2014, 8835 : 319 - 326
  • [43] A Parallel Privacy-Preserving k-Means Clustering Algorithm for Encrypted Databases in Cloud Computing
    Song, Youngho
    Kim, Hyeong-Jin
    Lee, Hyun-Jo
    Chang, Jae-Woo
    APPLIED SCIENCES-BASEL, 2024, 14 (02):
  • [44] Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity
    Beck, Martin
    Kerschbaum, Florian
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 31 - 37
  • [45] Application of Secure Two-Party Computation in a Privacy-Preserving Android App
    De Vincenzi, Marco
    Martinelli, Fabio
    Matteucci, Ilaria
    Sebastio, Stefano
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [46] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Run-hua Shi
    Mingwu Zhang
    International Journal of Theoretical Physics, 2019, 58 : 4249 - 4257
  • [47] A Novel Privacy-Preserving Two-Party Vector Dominance Statistic Protocol
    Liu, Jie
    Long, Xiaoli
    Chen, Changpin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 195 - 196
  • [48] Privacy-Preserving Two-Party Bartering Secure Against Active Adversaries
    Wueller, Stefan
    Pessin, Wadim
    Meyer, Ulrike
    Wetzel, Susanne
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [49] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Shi, Run-hua
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (12) : 4249 - 4257
  • [50] Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation
    Wei, Weiming
    Tang, Chunming
    Chen, Yucheng
    ENTROPY, 2022, 24 (08)