Privacy-Preserving Two-Party k-Means Clustering in Malicious Model

被引:6
|
作者
Akhter, Rahena [1 ]
Chowdhury, Rownak Jahan [1 ]
Emura, Keita [2 ]
Islam, Tamzida [1 ]
Rahman, Mohammad Shahriar [1 ]
Rubaiyat, Nusrat [1 ]
机构
[1] UAP, Dept CSE, Dhaka, Bangladesh
[2] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
k-means clustering; privacy-preserving; malicious model; threshold two-party computation;
D O I
10.1109/COMPSACW.2013.53
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacypreserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 50 条
  • [31] A scalable privacy-preserving recommendation scheme via bisecting k-means clustering
    Bilge, Alper
    Polat, Huseyin
    INFORMATION PROCESSING & MANAGEMENT, 2013, 49 (04) : 912 - 927
  • [32] Privacy-preserving two-party computation of line segment intersection
    Sheidani, Sorour
    Zarei, Alireza
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3415 - 3432
  • [33] Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings
    Memis, Burak
    Yakut, Ibrahim
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2948 - 2966
  • [34] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [35] Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering
    Forg, Fabian
    Wetzel, Susanne
    Meyer, Ulrike
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 107 - 114
  • [36] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [37] Privacy Preserving K-means Clustering: A Survey Research
    Meskine, Fatima
    Bahloul, Safia Nait
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (02) : 194 - 200
  • [38] Equally contributory privacy-preserving k-means clustering over vertically partitioned data
    Yi, Xun
    Zhang, Yanchun
    INFORMATION SYSTEMS, 2012, 38 (01) : 97 - 107
  • [39] Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments
    Rong, Hong
    Wang, Huimei
    Liu, Jian
    Hao, Jialu
    Xian, Ming
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [40] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Zhu, Youwen
    Li, Xingxin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2272 - 2284