Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007) 2007
DOI: 10.1109/icdmw.2007.65
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Clustering Algorithm for Distributed Data Streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…However, the achievements of scalability and fault-tolerance are still uncertain (transfer of the full database of a participant, encrypted, to the other participant, and use of random parts and SMC algorithms). The authors of [19] (which extends [17] and [18]) use similar SMC algorithms as well as random parts, and inherit from their drawbacks. The authors of [35] consider many more participants but (1) organize them in a rigid tree-like structure and use random parts and generic SMC techniques, which questions fault-tolerance and scalability, and (2) disclose the raw means, which raises security concerns.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the achievements of scalability and fault-tolerance are still uncertain (transfer of the full database of a participant, encrypted, to the other participant, and use of random parts and SMC algorithms). The authors of [19] (which extends [17] and [18]) use similar SMC algorithms as well as random parts, and inherit from their drawbacks. The authors of [35] consider many more participants but (1) organize them in a rigid tree-like structure and use random parts and generic SMC techniques, which questions fault-tolerance and scalability, and (2) disclose the raw means, which raises security concerns.…”
Section: Related Workmentioning
confidence: 99%
“…Specific SMC algorithms address the problem of clustering horizontally partitioned datasets [5,17,18,19,20,22,26,27,35]. Most of them consider only two participants, choose k-means or a similar algorithm for performing the clustering, and all tackle the honest-but-curious attack model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This algorithm utilizes divide and conquer method to get closed weighted frequent items in data stream. [28] Introduced a protocol for efficiency in communication and data security. This protocol is based on an IACA making it appropriate to find center cluster than other algorithms like k-mean.…”
Section: Application Of Data Mining In Crime Detectionmentioning
confidence: 99%
“…Determine frequent items based on closed weight in DataStream. [28] How to keep distributed privacy for clustering of data streams.…”
Section: Time Granularity Adjustmentmentioning
confidence: 99%