Privacy-preserving Density-based Clustering

被引:10
作者
Bozdemir, Beyza [1 ]
Canard, Sebastien [2 ]
Ermis, Orhan [1 ]
Moellering, Helen [3 ]
Onen, Melek [1 ]
Schneider, Thomas [3 ]
机构
[1] EURECOM, Sophia Antipolis, France
[2] Orange Labs, Appl Crypto Grp, Caen, France
[3] Tech Univ Darmstadt, Darmstadt, Germany
来源
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
欧盟地平线“2020”; 欧洲研究理事会;
关键词
Private Machine Learning; Clustering; Secure Computation;
D O I
10.1145/3433210.3453104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Clustering is an unsupervised machine learning technique that outputs clusters containing similar data items. In this work, we investigate privacy-preserving density-based clustering which is, for example, used in financial analytics and medical diagnosis. When (multiple) data owners collaborate or outsource the computation, privacy concerns arise. To address this problem, we design, implement, and evaluate the first practical and fully private density-based clustering scheme based on secure two-party computation. Our protocol privately executes the DBSCAN algorithm without disclosing any information (including the number and size of clusters). It can be used for private clustering between two parties as well as for private outsourcing of an arbitrary number of data owners to two non-colluding servers. Our implementation of the DBSCAN algorithm privately clusters data sets with 400 elements in 7 minutes on commodity hardware. Thereby, it flexibly determines the number of required clusters and is insensitive to outliers, while being only factor 19x slower than today's fastest private K-means protocol (Mohassel et al., PETS'20) which can only be used for specific data sets. We then show how to transfer our newly designed protocol to related clustering algorithms by introducing a private approximation of the TRACLUS algorithm for trajectory clustering which has interesting real-world applications like financial time series forecasts and the investigation of the spread of a disease like COVID-19.
引用
收藏
页码:658 / 671
页数:14
相关论文
共 73 条
  • [1] Ahmed M., 2016, FUTURE GENER COMP SY
  • [2] Aivodji U. M, 2018, WISEC
  • [3] Almutairi N, 2018, INT C INNOVATIVE TEC
  • [4] Amirbekyan A., 2006, INTELLIGENCE SECURIT
  • [5] Anikin IV, 2017, IEEE INT SIBER CONF
  • [6] [Anonymous], 2007, P ACM SIGMOD INT C M, DOI DOI 10.1145/1247480.1247546
  • [7] An extensive comparative study of cluster validity indices
    Arbelaitz, Olatz
    Gurrutxaga, Ibai
    Muguerza, Javier
    Perez, Jesus M.
    Perona, Inigo
    [J]. PATTERN RECOGNITION, 2013, 46 (01) : 243 - 256
  • [8] Asharov G., 2013, CCS
  • [9] Balcan MF, 2017, PR MACH LEARN RES, V70
  • [10] Bampoulidis A, 2020, PRIVATELY CONNECTING