Title :
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
Author :
Akhter, Rahena ; Chowdhury, Rownak Jahan ; Emura, Keita ; Islam, Tarikul ; Rahman, Md Saifur ; Rubaiyat, Nusrat
Author_Institution :
Dept. of CSE, Univ. of Asia Pacific (UAP), Dhaka, Bangladesh
Abstract :
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
Keywords :
cryptographic protocols; data privacy; pattern clustering; malicious model; noninteractive zero knowledge protocols; privacy-preserving two-party k-means clustering; threshold homomorphic encryption; Computational modeling; Databases; Encryption; Protocols; Public key; k-means clustering; malicious model; privacy-preserving; threshold two-party computation;
Conference_Titel :
Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual
Conference_Location :
Japan
DOI :
10.1109/COMPSACW.2013.53