Outsourced and Privacy-Preserving K-means Clustering Scheme for Smart Grid

被引:2
|
作者
Shen, Xielin [1 ]
Yuan, Bo [1 ]
Peng, Weiwen [1 ]
Qian, Yuanquan [1 ]
Wu, Yonghua [2 ]
机构
[1] Quanzhou Power Supply Co, State Grid Fujian Elect Power Co Ltd, Quanzhou 362000, Fujian, Peoples R China
[2] Jiangxia Univ, Sch Elect Informat Sci, Fujian 350108, Fujian, Peoples R China
关键词
outsourcing computing; k-means clustering; privacy-preserving; secure two-party computing; smart grid;
D O I
10.1109/ICICN56848.2022.10006564
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, the k-means clustering algorithm is generally used to mine the available characteristics from the massive power consumption data, so as to provide high-quality and customized electricity services for grid users. However, these data is sensitive and can be used to speculate on large amounts of private information, such as users living habits. To address these problems, this paper proposes an outsourced and privacy-preserving k-means clustering scheme (OPKM). Firstly, the additive secret sharing technology is used to split user data into two shares, which are sent to two cloud servers. Secondly, secure distance, multiplexer, minimum and division protocols are designed to achieve the secure cluster initialization and secure clustering for k-means algorithm. The experimental results with real electricity dataset show that the clustering accuracy and efficiency of the proposed OPKM scheme is better compared the existing works.
引用
收藏
页码:307 / 313
页数:7
相关论文
共 50 条
  • [21] PPMCK: Privacy-preserving multi-party computing for K-means clustering
    Fan, Yongkai
    Bai, Jianrong
    Lei, Xia
    Lin, Weiguo
    Hu, Qian
    Wu, Guodong
    Guo, Jiaming
    Tan, Gang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 154 (154) : 54 - 63
  • [22] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
    Akhter, Rahena
    Chowdhury, Rownak Jahan
    Emura, Keita
    Islam, Tamzida
    Rahman, Mohammad Shahriar
    Rubaiyat, Nusrat
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126
  • [23] Federated fuzzy k-means for privacy-preserving behavior analysis in smart grids
    Wang, Yi
    Ma, Jiahao
    Gao, Ning
    Wen, Qingsong
    Sun, Liang
    Guo, Hongye
    APPLIED ENERGY, 2023, 331
  • [24] Privacy of outsourced two-party k-means clustering
    Cai, Yunlu
    Tang, Chunming
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (08):
  • [25] Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption
    Zhang, Peng
    Huang, Teng
    Sun, Xiaoqiang
    Zhao, Wei
    Liu, Hongwei
    Lai, Shangqi
    Liu, Joseph K.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2348 - 2359
  • [26] Privacy Preserving K-means Clustering: A Survey Research
    Meskine, Fatima
    Bahloul, Safia Nait
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (02) : 194 - 200
  • [27] Equally contributory privacy-preserving k-means clustering over vertically partitioned data
    Yi, Xun
    Zhang, Yanchun
    INFORMATION SYSTEMS, 2012, 38 (01) : 97 - 107
  • [28] Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments
    Rong, Hong
    Wang, Huimei
    Liu, Jian
    Hao, Jialu
    Xian, Ming
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [29] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Zhu, Youwen
    Li, Xingxin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2272 - 2284
  • [30] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Youwen Zhu
    Xingxin Li
    Peer-to-Peer Networking and Applications, 2020, 13 : 2272 - 2284