Abstract
In this paper, we propose an efficient approach for privacy preserving distributed k-means clustering in unsecured horizontally distributed data. We use an elliptic curve cryptography to offer data privacy and security against involving sites and an external adversary. We analyze the proposed approach in terms of privacy, security, communication, and computational cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Borhade, S.: A survey on privacy preserving data mining techniques. Int. J. Emerg. Technol. Adv. Eng. 5(2) (2015)
Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593–599 (2005)
Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28(2), 129–137 (1982)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. 29(2), 439–450 (2000)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Annual International Cryptology Conference, pp. 36–54 (2000)
Goldreich, O.: Draft of a chapter on general protocols. In: Foundation of Cryptography. The Press Syndicate of the University of Cambridge (2003)
Goldreich O., Micali S., Wigderson A.: How to play any mental game—a completeness theorem for protocols with honest majority. In: Proceedings of the Nineteenth ACM Symposium of the Theory of Computing, pp. 218–229 (1987)
Vaidya, J.: A survey of privacy-preserving methods across vertically partitioned data. In: Privacy-Preserving Data Mining, pp. 337–358 (2008)
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Rec. 33(1), 50–57 (2004)
Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. (CSUR) 31(3), 264–323 (1999)
MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, no. 14, pp. 281–297 (1967)
Oliveira, S.R., Zaiane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Workshop on Secure Data Management, pp. 67–82 (2004)
Oliveira, S.R., Zaïane, O.R.: Privacy preserving clustering by data transformation. In: Proceedings of the Eighteenth Brazilian Symposium on Databases, pp. 304–318 (2003)
Merugu, S., Ghosh, J.: Privacy-preserving distributed clustering using generative models. In: Proceedings of the Third IEEE International Conference on Data Mining, pp. 211–218 (2003)
Klusch, M., Lodi, S., Moro, G.: Distributed clustering based on sampling local density estimates. In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, pp. 485–490 (2003)
Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206–215 (2003)
Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: Proceedings of the Seventeenth Annual Computer Security Applications Conference, pp. 102–110 (2001)
Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of the Twenty-seventh IEEE Annual Symposium on Foundations of Computer Science, pp. 162–167 (1986)
Samet, S., Miri, A., Orozco-Barbosa, L.: Privacy preserving k-means clustering in multi-party environment. In: Proceedings of the International Conference on Security and Cryptography, pp. 523–531 (2007)
Jha, S., Kruger, L., McDaniel, P.: Privacy preserving clustering. In: European Symposium on Research in Computer Security, pp. 397–417 (2005)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shewale, A., Keshavamurthy, B.N., Modi, C.N. (2019). An Efficient Approach for Privacy Preserving Distributed K-Means Clustering in Unsecured Environment. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_44
Download citation
DOI: https://doi.org/10.1007/978-981-10-8639-7_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8638-0
Online ISBN: 978-981-10-8639-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)