期刊文献+

隐私保护的快速聚类算法

Fast privacy-preserving clustering algorithm
下载PDF
导出
摘要 针对基于安全多方计算聚类算法的低效问题,提出了基于聚类特征树结构的隐私保护的层次k-means聚类算法。算法基于半诚信模型,在第三方内存中保留对各记录的索引信息及聚类特征树的当前层信息,减少了I/O次数和通信量,克服了难以适应多数据方和因过于信赖第三方导致隐私泄漏等缺陷。算法通过基于安全多方计算的标准化协议、距离计算协议和聚类中心计算协议,实现了数据的有效保护,综合层次和k-means聚类算法的优点,提高了计算精度和算法的可伸缩性。理论证明了算法的安全性和高效性,实验结果表明所提算法优于同类算法。 To improve the efficiency of a clustering algorithm based on secure multi party computation, a privacy preserving hierarchical k means algorithm based on clustering feature tree and semi-honest model is proposed. The algorithm stores the index information of every record and current hierarchical information of the clustering feature tree in the third party's memory and reduces the I/O times and communication cost, it also overcomes the drawbacks of applying to multi-party difficultly and leaking privacy due to depending on the third party excessively. The algorithm introduces three secure protocols such as distance computation, clustering center computation and standardization to protect data privacy effectively and accurately, and improves the precision and flexibility by combining the merits of hierarchical and k-means clustering algorithms. Theoretic argument demonstrates that the algorithm is secure and completes with good efficiency. The experimental results show that the proposed algorithm outperforms the other existing algorithms in communication cost and computation cost.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2009年第10期2521-2526,共6页 Systems Engineering and Electronics
基金 国家自然科学基金(60773049 60603041) 江苏大学高级人才启动基金(09JDG041)资助课题
关键词 隐私保护 数据挖掘 安全多方计算 聚类特征树 相异矩阵 privacy preserving data mining secure multi-party computation clustering feature tree dissimilarity matrix
  • 相关文献

参考文献12

  • 1Agrawal R, Srikant R. Privacy-preserving data mining[C]//Proc. of the ACM SIGMOD Conference on Management of Data, Dallas, Texas, 2000 : 439 - 450.
  • 2Lindell Y, Pinkas B. Privacy preserving data mining[C]//Proc. of Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science, Sprlnger-Verlag, 2000,1880 : 36 - 53.
  • 3Kantareioglu M , Clifton C. Privacy - preserving distributed mining of association rules on horizontally partitioned data [J]. IEEE Trans. on Knowedge & Data Engineering, 2004,16(9) : 24 - 31.
  • 4Vaidya J, Clifton C. Privacy preserving association rule mining in vertically partitioned data[C]// Proc. of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ,2002:639 - 644.
  • 5Vaidya J, Clifton C. Privacy-preserving k-means clustering over vertically partitioned data[C]// Proc. of the 9th ACM S IGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 2003:206 - 215.
  • 6Jha S, Kruger L, McDaniel P. Privacy preserving clustering[C]// Proc. of 10th European Symposium on Research in Computer Security, Milan, Italy, 2005:397 - 417.
  • 7Inan Ali, Kaya SV, Saygin Y. Privacy preserving clustering on horizontally partitioned data[J]. Data & Knowledge Engineering, 2007,63(3) :646 - 666.
  • 8Jagannathan G, Pillaipakkaamnatt K, Wright R. A new privacy-preserving distributed k clustering algorithm [C] // Proc. of SIAM International Conference on Data Mining, 2006: 492 -496.
  • 9Trottini M, Feinberg SE. Modelling user uncertainty for disclosure risk and data utility[J]. International Journal of Uncertainty ,Fuzziness and Knowledge-Based Systems, 2002, 10(5) : 511 - 527.
  • 10Goldreich O. Foundations of cryptography: basic applications [M]. London: Cambridge University Press, 2004.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部