Two-party privacy-preserving agglomerative document clustering

被引:0
|
作者
Su, Chunhua [1 ]
Zhou, Jianying [2 ]
Bao, Feng [2 ]
Takagi, Tsuyoshi [3 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Inst Infocomm Res, SSD, Singapore, Singapore
[3] Future Univ, Sch Syst Informat Sci, Hakodate, Hokkaido, Japan
关键词
documents clustering; privacy-preserving; cryptographic protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Document clustering is a powerful data mining technique to analyze the large amount of documents and structure large sets of text or hypertext documents. Many organizations or companies want to share their documents in a similar theme to get the joint benefits. However, it also brings the problem of sensitive information leakage without consideration of privacy. In this paper, we propose a cryptography-based framework to do the privacy-preserving document clustering among the users under the distributed environment: two parties, each having his private documents, want to collaboratively execute agglomerative document clustering without disclosing their private contents.
引用
收藏
页码:193 / +
页数:3
相关论文
共 50 条
  • [1] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
    Akhter, Rahena
    Chowdhury, Rownak Jahan
    Emura, Keita
    Islam, Tamzida
    Rahman, Mohammad Shahriar
    Rubaiyat, Nusrat
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126
  • [2] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [3] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250
  • [4] Privacy-preserving two-party computation of line segment intersection
    Sheidani, Sorour
    Zarei, Alireza
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3415 - 3432
  • [5] Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings
    Memis, Burak
    Yakut, Ibrahim
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2948 - 2966
  • [6] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [7] Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering
    Forg, Fabian
    Wetzel, Susanne
    Meyer, Ulrike
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 107 - 114
  • [8] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [9] Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity
    Beck, Martin
    Kerschbaum, Florian
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 31 - 37
  • [10] Application of Secure Two-Party Computation in a Privacy-Preserving Android App
    De Vincenzi, Marco
    Martinelli, Fabio
    Matteucci, Ilaria
    Sebastio, Stefano
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,