Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing

24Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Data clustering is the unsupervised classification of data records into groups. As one of the steps in data analysis, it has been widely researched and applied in practical life, such as pattern recognition, image processing, information retrieval, geography, and marketing. In addition, the rapid increase of data volume in recent years poses a huge challenge for resource-constrained data owners to perform computation on their data. This leads to a trend that users authorize the cloud to perform computation on stored data, such as keyword search, equality test, and outsourced data clustering. In outsourced data clustering, the cloud classifies users' data into groups according to their similarities. Considering the sensitive information in outsourced data and multiple data owners in practical application, it is necessary to develop a privacy-preserving outsourced clustering scheme under multiple keys. Recently, Rong et al. proposed a privacy-preserving outsourced k-means clustering scheme under multiple keys. However, in their scheme, the assistant server (AS) is able to extract the ratio of two underlying data records, and key management server (KMS) can decrypt the ciphertexts of owners' data records, which break the privacy security. AS can even reduce all data records if it knows one of the data records. To solve the aforementioned problem, we propose a highly secure privacy-preserving outsourced k-means clustering scheme under multiple keys in cloud computing. In this paper, noncolluded cloud computing service (CCS) and KMS jointly perform clustering over the encrypted data records without exposing data privacy. Specifically, we use BCP encryption which has additive homomorphic property and AES encryption to double encrypt data records, where the former cryptosystem prevents CCS from obtaining any useful information from received ciphertexts and the latter one protects data records from being decrypted by KMS. We first define five protocols to realize different functions and then present our scheme based on these protocols. Finally, we give the security and performance analyses which show that our scheme is comparable with the existing schemes on functionality and security.

References Powered by Scopus

Data clustering: A review

10810Citations
N/AReaders
Get full text

Data clustering: 50 years beyond K-means

7280Citations
N/AReaders
Get full text

Public-key cryptosystems based on composite degree residuosity classes

5547Citations
N/AReaders
Get full text

Cited by Powered by Scopus

An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage

24Citations
N/AReaders
Get full text

Multi-Party Verifiable Privacy-Preserving Federated k -Means Clustering in Outsourced Environment

8Citations
N/AReaders
Get full text

Hybrid Cloud-Based Privacy Preserving Clustering as Service for Enterprise Big Data

8Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zou, Y., Zhao, Z., Shi, S., Wang, L., Peng, Y., Ping, Y., & Wang, B. (2020). Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/1238505

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

58%

Lecturer / Post doc 3

25%

Professor / Associate Prof. 1

8%

Researcher 1

8%

Readers' Discipline

Tooltip

Computer Science 8

67%

Engineering 3

25%

Psychology 1

8%

Save time finding and organizing research with Mendeley

Sign up for free