Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm

被引:19
作者
Catak, Ferhat Ozgur [1 ]
Aydin, Ismail [2 ]
Elezaj, Ogerta [1 ]
Yildirim-Yayilgan, Sule [1 ]
机构
[1] NTNU Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
[2] Istanbul Sehir Univ, Cyber Secur Engn, TR-34865 Istanbul, Turkey
关键词
cryptography; clustering; homomorphic encryption; machine learning; EXTREME LEARNING-MACHINE;
D O I
10.3390/electronics9020229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The protection and processing of sensitive data in big data systems are common problems as the increase in data size increases the need for high processing power. Protection of the sensitive data on a system that contains multiple connections with different privacy policies, also brings the need to use proper cryptographic key exchange methods for each party, as extra work. Homomorphic encryption methods can perform similar arithmetic operations on encrypted data in the same way as a plain format of the data. Thus, these methods provide data privacy, as data are processed in the encrypted domain, without the need for a plain form and this allows outsourcing of the computations to cloud systems. This also brings simplicity on key exchange sessions for all sides. In this paper, we propose novel privacy preserving clustering methods, alongside homomorphic encryption schemes that can run on a common high performance computation platform, such as a cloud system. As a result, the parties of this system will not need to possess high processing power because the most power demanding tasks would be done on any cloud system provider. Our system offers a privacy preserving distance matrix calculation for several clustering algorithms. Considering both encrypted and plain forms of the same data for different key and data lengths, our privacy preserving training method's performance results are obtained for four different data clustering algorithms, while considering six different evaluation metrics.
引用
收藏
页数:20
相关论文
共 27 条
[1]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]  
[Anonymous], 2006, PATTERN RECOGN
[3]   MODEL-BASED GAUSSIAN AND NON-GAUSSIAN CLUSTERING [J].
BANFIELD, JD ;
RAFTERY, AE .
BIOMETRICS, 1993, 49 (03) :803-821
[4]  
Barker E., 2012, NIST Special Publication (SP) 800-38G, V800, P1, DOI DOI 10.6028/NIST.SP.800-57PT1R4
[5]   CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems [J].
Catak, Ferhat Ozgur ;
Mustacoglu, Ahmet Fatih .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2018, 11 (01) :33-44
[6]  
Chaudhuri K., 2009, ADV NEURAL INFORM PR, P289
[7]  
Cuzzocrea A., 2014, P 1 INT WORKSH PRIV, P45, DOI [10.1145/2663715.2669614, DOI 10.1145/2663715.2669614]
[8]   A local-density based spatial clustering algorithm with noise [J].
Duan, Lian ;
Xu, Lida ;
Guo, Feng ;
Lee, Jun ;
Yan, Baopin .
INFORMATION SYSTEMS, 2007, 32 (07) :978-986
[9]   Review of a medical illustration department's data processing system to confirm general data protection regulation (GDPR) compliance [J].
Edwards, Simon .
JOURNAL OF VISUAL COMMUNICATION IN MEDICINE, 2019, 42 (03) :140-143
[10]   Privacy preserving decision tree learning over multiple parties [J].
Emekci, F. ;
Sahin, O. D. ;
Agrawal, D. ;
El Abbadi, A. .
DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) :348-361