期刊文献+

分布式数据隐私保护K-均值聚类算法 被引量:5

Privacy-preserving K-means Clustering Algorithm over Distributed Data
下载PDF
导出
摘要 如何获取准确的数据关系而不泄露合作方的任何私有数据是分布式数据挖掘隐私保护首要任务。将安全多方计算与数据挖掘技术相结合,提出应用于水平分布和垂直分布类型的数据的隐私保护k-均值聚类算法。实验表明算法能有效的保护数据的隐私,且对聚类结果没有影响。 Privacy -preserving distributed data mining seeks to obtain accurate models without leaking the private data of the participated parties. Propose a privacy - preserving k - means clustering algorithm over horizontally and vertically partitioned data by integrating secure multi - party computation algorithm with data mining technology. Experiments show that it can efficiently preserves privacy in data items as well as guarantee valid clustering results.
出处 《计算机与数字工程》 2008年第7期113-116,177,共5页 Computer & Digital Engineering
关键词 分布式数据挖掘 隐私保护 K-均值聚类 安全多方计算 distributed data mining, privacy - preserving, k - means clustering, secure multi - party computation
  • 相关文献

参考文献6

  • 1Hanjiawei,Kamber M著,范明,孟小峰等译.数据挖掘慨念与技术[M].北京:机械工业出版社,2001,8.
  • 2罗永龙,徐致云,黄刘生.安全多方的统计分析问题及其应用[J].计算机工程与应用,2005,41(24):141-143. 被引量:14
  • 3吕品,陈年生,董武世.面向隐私保护的数据挖掘技术研究[J].计算机技术与发展,2006,16(7):147-149. 被引量:9
  • 4Vaidya J,Clifton C. Privacy -presel'ving k - means clustering over vertically partitioned data[C ]. Proc of the 9th ACM SIGKDD Intl Conf on Knowledge Discovery and Data Mining, Washington, DC, USA, August 2003 : 206 - 215.
  • 5Oliveira S R M, Za ane O R. Achieving privacy preservation when sharing data for clustering [C]. Proceedings of the International Workshop on Secure Data Management in a Connected World (SDM'04)in Conjunction with VLDB 2004, Toronto, Canada, August 2004.
  • 6Blake C L, Merz C J. UCI repository of machine learning databases[D]. University of California, Irvine, Dept of Information and Computer Sciences, 1998.

二级参考文献24

  • 1O Goldreich.Secure multi-party computation.manuscript version 1.3. http ://theory.lcs.mit.edu/-oded, 2002.
  • 2A C Yao.Protocols for secure computations[C].In:Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982:160-164.
  • 3C Cachin.Efficient Private Bidding and Auctions with an Oblivious Third Party[C].In:Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999 : 120- 127.
  • 4A C Yao.How to generate and exchange secrets[C].In:Proceedings 27th IEEE Symposium on Foundations of Computer Science, 1986: 162-167.
  • 5O Goldreich,S Micali,A Wigderson.How to play any mental game[C]. In:Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987 : 218-229.
  • 6S Goldwasser.Multi-party computations : Past and present[C].In : Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, 1997:1-6.
  • 7Wenliang Du,Mikhail J Atallah. Privacy-preserving statistical analysis[C].In:Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, 2001 : 102- 110.
  • 8Benaloh J C.Secret sharing homomorphisms:Keeping a secret secret[C]. In:Proceedings of Crypto'86, Lecture Notes on Comput Sci,263, Springer Verlag, 1986 : 251 -260.
  • 9Chris Clifton,Murat Kantarcioglu,Xiaodong Lin et al.Tools for privacy preserving[J].Distributed Data Mining ACM SIGKDD Explorations, 2003;4(2) : 1-7.
  • 10D Boneh,M Franklin.Efficient generation of shared RSA keys[J]. J ACM ,2001 ;48:702-722.

共引文献22

同被引文献27

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部