Skip to main content

An Efficient Approach for Privacy Preserving Distributed K-Means Clustering in Unsecured Environment

  • Conference paper
  • First Online:
Recent Findings in Intelligent Computing Techniques

Abstract

In this paper, we propose an efficient approach for privacy preserving distributed k-means clustering in unsecured horizontally distributed data. We use an elliptic curve cryptography to offer data privacy and security against involving sites and an external adversary. We analyze the proposed approach in terms of privacy, security, communication, and computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Borhade, S.: A survey on privacy preserving data mining techniques. Int. J. Emerg. Technol. Adv. Eng. 5(2) (2015)

    Google Scholar 

  2. Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593–599 (2005)

    Google Scholar 

  3. Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28(2), 129–137 (1982)

    Article  MathSciNet  Google Scholar 

  4. Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. 29(2), 439–450 (2000)

    Article  Google Scholar 

  5. Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Annual International Cryptology Conference, pp. 36–54 (2000)

    Google Scholar 

  6. Goldreich, O.: Draft of a chapter on general protocols. In: Foundation of Cryptography. The Press Syndicate of the University of Cambridge (2003)

    Google Scholar 

  7. Goldreich O., Micali S., Wigderson A.: How to play any mental game—a completeness theorem for protocols with honest majority. In: Proceedings of the Nineteenth ACM Symposium of the Theory of Computing, pp. 218–229 (1987)

    Google Scholar 

  8. Vaidya, J.: A survey of privacy-preserving methods across vertically partitioned data. In: Privacy-Preserving Data Mining, pp. 337–358 (2008)

    Chapter  Google Scholar 

  9. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Rec. 33(1), 50–57 (2004)

    Article  Google Scholar 

  10. Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. (CSUR) 31(3), 264–323 (1999)

    Article  Google Scholar 

  11. MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, no. 14, pp. 281–297 (1967)

    Google Scholar 

  12. Oliveira, S.R., Zaiane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Workshop on Secure Data Management, pp. 67–82 (2004)

    Google Scholar 

  13. Oliveira, S.R., Zaïane, O.R.: Privacy preserving clustering by data transformation. In: Proceedings of the Eighteenth Brazilian Symposium on Databases, pp. 304–318 (2003)

    Google Scholar 

  14. Merugu, S., Ghosh, J.: Privacy-preserving distributed clustering using generative models. In: Proceedings of the Third IEEE International Conference on Data Mining, pp. 211–218 (2003)

    Google Scholar 

  15. Klusch, M., Lodi, S., Moro, G.: Distributed clustering based on sampling local density estimates. In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, pp. 485–490 (2003)

    Google Scholar 

  16. Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206–215 (2003)

    Google Scholar 

  17. Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: Proceedings of the Seventeenth Annual Computer Security Applications Conference, pp. 102–110 (2001)

    Google Scholar 

  18. Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of the Twenty-seventh IEEE Annual Symposium on Foundations of Computer Science, pp. 162–167 (1986)

    Google Scholar 

  19. Samet, S., Miri, A., Orozco-Barbosa, L.: Privacy preserving k-means clustering in multi-party environment. In: Proceedings of the International Conference on Security and Cryptography, pp. 523–531 (2007)

    Google Scholar 

  20. Jha, S., Kruger, L., McDaniel, P.: Privacy preserving clustering. In: European Symposium on Research in Computer Security, pp. 397–417 (2005)

    Chapter  Google Scholar 

  21. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Shewale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shewale, A., Keshavamurthy, B.N., Modi, C.N. (2019). An Efficient Approach for Privacy Preserving Distributed K-Means Clustering in Unsecured Environment. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_44

Download citation

Publish with us

Policies and ethics