Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1379287.1379291acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicaseConference Proceedingsconference-collections
research-article

Distributed privacy preserving k-means clustering with additive secret sharing

Published:29 March 2008Publication History

ABSTRACT

Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the current techniques for privacy preserving data mining suffer from high communication and computation overheads which are prohibitive considering even a modest database size. Furthermore, the proposed techniques have strict assumptions on the involved parties which need to be relaxed in order to reflect the real-world requirements. In this paper we concentrate on a distributed scenario where the data is partitioned vertically over multiple sites and the involved sites would like to perform clustering without revealing their local databases. For this setting, we propose a new protocol for privacy preserving k-means clustering based on additive secret sharing. We show that the new protocol is more secure than the state of the art. Experiments conducted on real and synthetic data sets show that, in realistic scenarios, the communication and computation cost of our protocol is considerably less than the state of the art which is crucial for data mining applications.

References

  1. Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, May 16--18, 2000, Dallas, Texas, USA, pages 439--450. ACM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computing, pages 1--10, New York, NY, USA, 1988. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, and Michael Y. Zhu. Tools for privacy preserving distributed data mining. SIGKDD Explor. Newsl., 4(2):28--34, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Marc Fischlin. A cost-effective pay-per-multiplication comparison method for millionaires. In Progress in Cryptology - CT-RSA 2001: The Cryptographers' Track at RSA Conference 2001, volume 2020 of Lecture Notes in Computer Science, page 457, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Murat Kantarcioglu and Chris Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng., 16(9):1026--1037, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. V. Kaya, T. B. Pedersen, E. Savaş, and Y. Saygin. Efficient privacy preserving distributed clustering based on secret sharing. In PAKDD 2007 International Workshops: Emerging Technologies in Knowledge Discovery and Data Mining, pages 280--291. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Selim Volkan Kaya. Toolbox for Privacy Preserving Data Mining. Master's thesis, Sabanci University, Istanbul, TURKEY, July 2007.Google ScholarGoogle Scholar
  8. Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. Cryptographically private support vector machines. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 618--624. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kun Liu, Hillol Kargupta, and Jessica Ryan. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng., 18(1):92--106, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology --- EUROCRYPT '99. International Conference on the Theory and Application of Cryptographic Techniques, Lecture Notes in Computer Science, pages 223--238. Springer-Verlag, May 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Tomas Sander, Adam Young, and Moti Yung. Non-interactive cryptocomputing for nc1. In FOCS '99: Proceedings of the 40th Annual Symposium on Foundations of Computer Science, page 554, Washington, DC, USA, 1999. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jaideep Vaidya and Chris Clifton. Privacy-preserving k-means clustering over vertically partitioned data. In KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 206--215, New York, NY, USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jaikumar Vijayan. House committee chair wants info on cancelled dhs data-mining programs. Computer World, September 18 2007.Google ScholarGoogle Scholar
  14. Rebecca Wright and Zhiqiang Yang. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD '04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 713--718, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Andrew C. Yao. Protocols for secure computations. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS '82), pages 160--164, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Distributed privacy preserving k-means clustering with additive secret sharing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      PAIS '08: Proceedings of the 2008 international workshop on Privacy and anonymity in information society
      March 2008
      75 pages
      ISBN:9781595939654
      DOI:10.1145/1379287

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 March 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader