Mutual Privacy Preserving k-Means Clustering in Social Participatory Sensing

被引:79
作者
Xing, Kai [1 ]
Hu, Chunqiang [2 ,3 ]
Yu, Jiguo [5 ]
Cheng, Xiuzhen [4 ]
Zhang, Fengjuan [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Anhui, Peoples R China
[2] Chongqing Univ, Sch Software Engn, Chongqing 400030, Peoples R China
[3] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400030, Peoples R China
[4] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[5] Qufu Normal Univ, Sch Informat Sci & Engn, Jining 273165, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Homomorphic encryption; k-means clustering; privacy preservation; social networking big data; social participatory sensing;
D O I
10.1109/TII.2017.2695487
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the problem of mutual privacy protection in social participatory sensing in which individuals contribute their private information to build a (virtual) community. Particularly, we propose a mutual privacy preserving k-means clustering scheme that neither discloses an individual's private information nor leaks the community's characteristic data (clusters). Our scheme contains two privacy-preserving algorithms called at each iteration of the k-means clustering. The first one is employed by each participant to find the nearest cluster while the cluster centers are kept secret to the participants; and the second one computes the cluster centers without leaking any cluster center information to the participants while preventing each participant from figuring out other members in the same cluster. An extensive performance analysis is carried out to show that our approach is effective for k-means clustering, can resist collusion attacks, and can provide mutual privacy protection even when the data analyst colludes with all except one participant.
引用
收藏
页码:2066 / 2076
页数:11
相关论文
共 28 条
[1]   A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn [J].
Bi, Wenjie ;
Cai, Meili ;
Liu, Mengqi ;
Li, Guo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (03) :1270-1281
[2]  
Bradley P. S., 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P91
[3]  
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486
[4]  
Clifton C., 2003, P 9 ACM SIGKDD INT C, P206, DOI DOI 10.1145/956755.956776
[5]  
Doganay M.C., 2008, Proceedings of the 2008 international workshop on Privacy and anonymity in information society, P3
[6]  
Du WL, 2001, 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P102, DOI 10.1109/ACSAC.2001.991526
[7]  
Erkin Z., 2007, EURASIP Journal on Information Security, V7, P1, DOI 10.1155/2007/78943
[8]   Privacy-preserving distributed clustering [J].
Erkin, Zekeriya ;
Veugen, Thijs ;
Toft, Tomas ;
Lagendijk, Reginald L. .
EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01)
[9]   A THEORY OF SOCIAL COMPARISON PROCESSES [J].
Festinger, Leon .
HUMAN RELATIONS, 1954, 7 (02) :117-140
[10]   A Survey of Homomorphic Encryption for Nonspecialists [J].
Fontaine, Caroline ;
Galand, Fabien .
EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01)