Affiliation:
1. Sabanci University, Turkey
Abstract
Recent concerns about privacy issues have motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. One approach to develop privacy preserving data mining algorithms is secure multiparty computation, which allows for privacy preserving data mining algorithms that do not trade accuracy for privacy. However, earlier methods suffer from very high communication and computational costs, making them infeasible to use in any real world scenario. Moreover, these algorithms have strict assumptions on the involved parties, assuming involved parties will not collude with each other. In this paper, the authors propose a new secure multiparty computation based k-means clustering algorithm that is both secure and efficient enough to be used in a real world scenario. Experiments based on realistic scenarios reveal that this protocol has lower communication costs and significantly lower computational costs.
Reference18 articles.
1. Privacy-Preserving Data Mining
2. Privacy-preserving data mining
3. Ben-Or, M., Goldwasser, S., & Wigderson, A. (1998). Completeness theorems for non-cryptographic fault-tolerant distributed computation. In STOC '88: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (pp. 1–10). New York: ACM.
4. Bethencourt, J. (2010). Paillier library. Retrieved from http://acsc.cs.utexas.edu/libpaillier/
5. Tools for privacy preserving distributed data mining
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Assessment of Waste Management through Mobile Edge Computing and Deep Learning;International Journal of Advanced Research in Science, Communication and Technology;2022-04-18