An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir’s Secret Sharing Scheme

作者: Sankita Patel , Sweta Garasia , Devesh Jinwala

DOI: 10.1007/978-3-642-29852-3_9

关键词:

摘要: Privacy preserving data mining has gained considerable attention because of the increased concerns to ensure privacy sensitive information. Amongst two basic approaches for mining, viz. Randomization based and Cryptography based, later provides high level but incurs higher computational as well communication overhead. Hence, it is necessary explore alternative techniques that improve overheads. In this work, we propose an efficient, collusion-resistant cryptography approach distributed K-Means clustering using Shamir’s secret sharing scheme. As show from theoretical practical analysis, our provably secure does not require a trusted third party. addition, negligible overhead compared existing approaches.

参考文章(28)
Yücel Saygın, Erkay Savaş, Thomas Brochmann Pedersen, Secret charing vs. encryption-based techniques for privacy preserving data mining Eurostat. ,(2007)
Gerald W. Kimble, Information and Computer Science Information and Computer Science. pp. 180- 180 ,(1975)
Kannan Srinathan, C. V. Jawahar, Maneesh Upmanyu, Anoop M. Namboodiri, Efficient Privacy Preserving K-Means Clustering Intelligence and Security Informatics. pp. 154- 166 ,(2010) , 10.1007/978-3-642-13601-6_17
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Somesh Jha, Luis Kruger, Patrick McDaniel, Privacy Preserving Clustering Computer Security – ESORICS 2005. pp. 397- 417 ,(2005) , 10.1007/11555827_23
Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Fengli Liu, Dianmin Yue, Privacy Preserving Data Mining Research: Current Status and Key Issues international conference on conceptual structures. pp. 762- 772 ,(2007) , 10.1007/978-3-540-72588-6_125
Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, A Framework for Evaluating Privacy Preserving Data Mining Algorithms Data Mining and Knowledge Discovery. ,vol. 11, pp. 121- 154 ,(2005) , 10.1007/S10618-005-0006-6
Benny Pinkas, Cryptographic techniques for privacy-preserving data mining Sigkdd Explorations. ,vol. 4, pp. 12- 19 ,(2002) , 10.1145/772862.772865