Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering

被引:0
|
作者
Ouda, Mohamed [1 ]
Salem, Sameh [2 ]
Ali, Ihab [1 ]
Saad, El-Sayed [1 ]
机构
[1] Helwan Univ, Dept Commun Elect & Comp Engn, Helwan, Egypt
[2] Helwan Univ, Dept Commun Elect & Comp Engn, Fac Engn, Helwan, Egypt
关键词
Privacy-preserving; secure multi-party computation; k-means clustering algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy concern has become an important issue in data mining. In this paper, a novel algorithm for privacy preserving in distributed environment using data clustering algorithm has been proposed As demonstrated, the data is locally clustered and the encrypted aggregated information is transferred to the master site. This aggregated information consists of centroids of clusters along with their sizes. On the basis of this local information, global centroids are reconstructed then it is transferred to all sites for updating their local centroids. Additionally, the proposed algorithm is integrated with Elliptic Curve Cryptography (EGG) public key cryptosystem and Diffie-Hellman key exchange. The proposed distributed encrypted scheme can add an increase not more than 15% in performance time relative to distributed non encrypted scheme but give not less than 48% reduction in performance time relative to centralized scheme with the same size of dataset Theoretical and experimental analysis illustrates that the proposed algorithm can effectively solve privacy preserving problem of clustering mining over distributed data and achieve the privacy-preserving aim.
引用
收藏
页码:604 / 612
页数:9
相关论文
共 50 条
  • [41] Clustering-oriented privacy-preserving data publishing
    Ni, Weiwei
    Chong, Zhihong
    KNOWLEDGE-BASED SYSTEMS, 2012, 35 : 264 - 270
  • [42] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [43] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [44] Efficient paillier cryptoprocessor for privacy-preserving data mining
    San, Ismail
    At, Nuray
    Yakut, Ibrahim
    Polat, Huseyin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1535 - 1546
  • [45] Recent Developments in Privacy-preserving Mining of Clinical Data
    Desmet, Chance
    Cook, Diane J.
    ACM/IMS Transactions on Data Science, 2021, 2 (04):
  • [46] Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
    Nix, Robert
    Kantarcioglu, Murat
    Han, Keesook J.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 129 - 144
  • [47] Privacy-Preserving Data Mining: Methods, Metrics, and Applications
    Mendes, Ricardo
    Vilela, Joao P.
    IEEE ACCESS, 2017, 5 : 10562 - 10582
  • [48] Data privacy in construction industry by privacy-preserving data mining (PPDM) approach
    Patel T.
    Patel V.
    Asian Journal of Civil Engineering, 2020, 21 (3) : 505 - 515
  • [49] DAG: A General Model for Privacy-Preserving Data Mining
    Teo, Sin G.
    Cao, Jianneng
    Lee, Vincent C. S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (01) : 40 - 53
  • [50] DAG: A General Model for Privacy-Preserving Data Mining
    Teo, Sin G.
    Cao, Jianneng
    Lee, Vincent C. S.
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 2018 - 2019