Privacy-preserving distributed clusteringReportar como inadecuado

Privacy-preserving distributed clustering - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

EURASIP Journal on Information Security

, 2013:4

Regular submissions


Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and-or commercially valuable such that the owners may not want to share their data with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol for distributed clustering that limits information leakage to the untrusted service provider that performs the clustering. To achieve this goal, we rely on cryptographic techniques, in particular homomorphic encryption, and further improve the state of the art of processing encrypted data in terms of efficiency by taking the distributed structure of the system into account and improving the efficiency in terms of computation and communication by data packing. While our construction can be easily adjusted to a centralized or a distributed computing model, we rely on a set of particular users that help the service provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner.

Electronic supplementary materialThe online version of this article doi:10.1186-1687-417X-2013-4 contains supplementary material, which is available to authorized users.

Download fulltext PDF

Autor: Zekeriya Erkin - Thijs Veugen - Tomas Toft - Reginald L Lagendijk


Documentos relacionados