Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Chunhua SU, Feng BAO, Jianying ZHOU, Tsuyoshi TAKAGI, Kouichi SAKURAI, "Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 4, pp. 1246-1250, April 2009, doi: 10.1587/transfun.E92.A.1246.
Abstract: Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.1246/_p
Copy
@ARTICLE{e92-a_4_1246,
author={Chunhua SU, Feng BAO, Jianying ZHOU, Tsuyoshi TAKAGI, Kouichi SAKURAI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes},
year={2009},
volume={E92-A},
number={4},
pages={1246-1250},
abstract={Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.},
keywords={},
doi={10.1587/transfun.E92.A.1246},
ISSN={1745-1337},
month={April},}
Copy
TY - JOUR
TI - Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1246
EP - 1250
AU - Chunhua SU
AU - Feng BAO
AU - Jianying ZHOU
AU - Tsuyoshi TAKAGI
AU - Kouichi SAKURAI
PY - 2009
DO - 10.1587/transfun.E92.A.1246
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 4
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - April 2009
AB - Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.
ER -