2020
DOI: 10.2478/popets-2020-0080
|View full text |Cite
|
Sign up to set email alerts
|

Practical Privacy-Preserving K-means Clustering

Abstract: Clustering is a common technique for data analysis, which aims to partition data into similar groups. When the data comes from different sources, it is highly desirable to maintain the privacy of each database. In this work, we study a popular clustering algorithm (K-means) and adapt it to the privacypreserving context.Specifically, to construct our privacy-preserving clustering algorithm, we first propose an efficient batched Euclidean squared distance computation protocol in the amortizing setting, when one … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
50
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(51 citation statements)
references
References 46 publications
0
50
0
Order By: Relevance
“…Algorithms based on secure multiparty computation (SMC) (Goldreich, 2009) can preserve the security and privacy of users' data. There existed literatures utilizing SMC like (Lindell & Pinkas, 2008;Mohassel, Rosulek & Trieu, 2020;Upmanyu, Namboodiri, Srinathan & Jawahar, 2010), in which algorithms were proposed to perform distributed data mining without revealing private inputs of participants. In addition, Clifton et al (Clifton, Kantarcioglu, Vaidya, Lin & Zhu, 2002) proposed that a relatively small set of cryptography primitive should be utilized to generate the SMC protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Algorithms based on secure multiparty computation (SMC) (Goldreich, 2009) can preserve the security and privacy of users' data. There existed literatures utilizing SMC like (Lindell & Pinkas, 2008;Mohassel, Rosulek & Trieu, 2020;Upmanyu, Namboodiri, Srinathan & Jawahar, 2010), in which algorithms were proposed to perform distributed data mining without revealing private inputs of participants. In addition, Clifton et al (Clifton, Kantarcioglu, Vaidya, Lin & Zhu, 2002) proposed that a relatively small set of cryptography primitive should be utilized to generate the SMC protocol.…”
Section: Related Workmentioning
confidence: 99%
“…HE allows to directly compute functions on encrypted data. The second paradigm uses secure multi-party computation (MPC) [10,11]. MPC allows mutually distrusting parties to collaboratively compute a joint function over their respective private data.…”
Section: Introductionmentioning
confidence: 99%
“…Unintended common characteristics between patients might Costly computation due to use of bit-wise encryption. MPC-KMeans [11] outperforms this scheme by 5000× for 400 data records. ‡ [18] is 194× faster than this scheme for 400 data records.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations