DocumentCode :
634856
Title :
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
Author :
Akhter, Rahena ; Chowdhury, Rownak Jahan ; Emura, Keita ; Islam, Tarikul ; Rahman, Md Saifur ; Rubaiyat, Nusrat
Author_Institution :
Dept. of CSE, Univ. of Asia Pacific (UAP), Dhaka, Bangladesh
fYear :
2013
fDate :
22-26 July 2013
Firstpage :
121
Lastpage :
126
Abstract :
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
Keywords :
cryptographic protocols; data privacy; pattern clustering; malicious model; noninteractive zero knowledge protocols; privacy-preserving two-party k-means clustering; threshold homomorphic encryption; Computational modeling; Databases; Encryption; Protocols; Public key; k-means clustering; malicious model; privacy-preserving; threshold two-party computation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual
Conference_Location :
Japan
Type :
conf
DOI :
10.1109/COMPSACW.2013.53
Filename :
6605776
Link To Document :
بازگشت