2015 11th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) 2015
DOI: 10.1109/msn.2015.42
|View full text |Cite
|
Sign up to set email alerts
|

Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…However, this work reveals the intermediate closet clustering centers to the server. Many recent works focus on clustering in the outsourcing setting (many parties and a trusted/untrusted mediator) [30,37,48,52], or differential privacy setting [8,51,53,54,62]. There are few recent works [18,28,43,58] that consider privacy preserving K-means clustering with full privacy guarantees.…”
Section: Related Workmentioning
confidence: 99%
“…However, this work reveals the intermediate closet clustering centers to the server. Many recent works focus on clustering in the outsourcing setting (many parties and a trusted/untrusted mediator) [30,37,48,52], or differential privacy setting [8,51,53,54,62]. There are few recent works [18,28,43,58] that consider privacy preserving K-means clustering with full privacy guarantees.…”
Section: Related Workmentioning
confidence: 99%
“…The K-Means-Algorithm has been a subject of interest in the context of privacy-preserving computations for some time, but to our knowledge all previous works like [9], [25], [24], [31] and [42] require interaction between several parties, e.g. via Multiparty Computation (MPC).…”
Section: Related Workmentioning
confidence: 99%
“…An extending homomorphic scheme of [216] was designed by Liu et al [217], involving two data owners holding horizontal partitions of the dataset. In each clustering round, the server allocates each encrypted data record to the nearest cluster, and the two data owners compute new cluster centers and uploads the encrypted clusters to the server for the next clustering operation.…”
Section: ) Clustering and Association Rule Miningmentioning
confidence: 99%