An efficient approach for privacy preserving distributed K-means clustering based on Shamir's secret sharing scheme

27Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Privacy preserving data mining has gained considerable attention because of the increased concerns to ensure privacy of sensitive information. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the overheads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed K-Means clustering using Shamir's secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and does not require a trusted third party. In addition, it has negligible computational overhead as compared to the existing approaches. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Patel, S., Garasia, S., & Jinwala, D. (2012). An efficient approach for privacy preserving distributed K-means clustering based on Shamir’s secret sharing scheme. In IFIP Advances in Information and Communication Technology (Vol. 374 AICT, pp. 129–141). https://doi.org/10.1007/978-3-642-29852-3_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free