2016
DOI: 10.5430/air.v6n1p27
|View full text |Cite
|
Sign up to set email alerts
|

New privacy preserving clustering methods for secure multiparty computation

Abstract: Many researches on privacy preserving data mining have been done. Privacy preserving data mining can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Further, in order to increase the security of data mining, secure multiparty computation (SMC) has been introduced. Most of works in SMC are developed on applying the model of SMC on different data distributions such as vertically, horizontally and arbitrarily partitioned data. Another type of S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…From the point of view, SMC algorithms for supervised learning such as BP method and unsupervised learning like K-means method were proposed. [17,22] So how is the algorithm of RL for SMC? In this case, as there is no data for learning, optimal behavior is found by repeating trial and error.…”
Section: Q-learning For Secure Multiparty Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…From the point of view, SMC algorithms for supervised learning such as BP method and unsupervised learning like K-means method were proposed. [17,22] So how is the algorithm of RL for SMC? In this case, as there is no data for learning, optimal behavior is found by repeating trial and error.…”
Section: Q-learning For Secure Multiparty Computationmentioning
confidence: 99%
“…Therefore, SMC for shared data has been considered. In Miyajima, et al, [17,22] learning methods for SMC of BP, fuzzy system and VQ methods have been proposed and the validity of them has been proved. On the other hand, though there are some studies on privacy preserving with RL, [18][19][20][21] they are ones of cryptogram algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Anonymity techniques for data publishing have been used in the relational data for a long time, and make great progress in relational database area, including k-anonymity, l-diversity, generalization, and so forth [1,2]. Can we apply the same anonymous techniques that apply to relational data to social networks?…”
Section: Introductionmentioning
confidence: 99%
“…Then, how should machine learning be realized on the edge system while protecting personal information? SMC is one of the typical models to realize machine learning safety [3][4][5]. The basic idea of SMC is to implement the data processing by dividing a dataset into subsets, processing the subset on each server, and integrating the results.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, for machine learning using SDM (Steepest Descent Method), secure learning methods can be realized. Horizontally partitioned data (HPD) and VPD are known for SMC [4,5]. The former is a method consisting of dividing a dataset into subsets, and the latter is a method consisting of dividing the dataset into element-separated subsets.…”
Section: Introductionmentioning
confidence: 99%