Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3910126, 19 pages
https://doi.org/10.1155/2017/3910126
Research Article

Privacy-Preserving -Means Clustering under Multiowner Setting in Distributed Cloud Environments

State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha, China

Correspondence should be addressed to Hong Rong; moc.liamtoh@tdun_gnoh.r

Received 16 June 2017; Revised 15 September 2017; Accepted 27 September 2017; Published 13 November 2017

Academic Editor: Xiangyang Luo

Copyright © 2017 Hong Rong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Hajjat, X. Sun, Y.-W. E. Sung et al., “Cloudward bound: planning for beneficial migration of enterprise applications to the cloud,” in Proceedings of the 7th International Conference on Autonomic Computing, SIGCOMM 2010, pp. 243–254, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. Amazon Machine Learning, https://aws.amazon.com/machine-learning.
  3. Cloud Machine Learning Engine, https://cloud.google.com/ml-engine.
  4. “Do your best work with Watson,” https://www.ibm.com/watson.
  5. D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud data protection for the masses,” The Computer Journal, vol. 45, no. 1, Article ID 6127995, pp. 39–45, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. Health Information Privacy, U.S, Department of Health & Human Services, https://www.hhs.gov/hipaa/for-individuals/guidance-materials-for-consumers/index.html.
  7. J. Vaidya and C. Clifton, “Privacy-preserving k-means clustering over arbitrarily partitioned data,” in ACM KDD, 2003.
  8. G. Jagannathan and R. N. Wright, “Privacy-preserving distributed k-means clustering over arbitrarily partitioned data,” in Proceedings of the KDD-2005: 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 593–599, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Jha, L. Kruger, and P. McDaniel, “Privacy preserving clustering,” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 3679, pp. 397–417, 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. K.-P. Lin, “Privacy-preserving kernel k-means outsourcing with randomized kernels,” in Proceedings of the 13th IEEE International Conference on Data Mining Workshops, ICDMW 2013, pp. 860–866, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. K.-P. Lin, “Privacy-preserving kernel k-means clustering outsourcing with random transformation,” Knowledge and Information Systems, vol. 49, no. 3, pp. 885–908, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Liu, E. Bertino, and X. Yi, “Privacy of outsourced k-means clustering,” in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014, pp. 123–133, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. N. Almutairi, F. Coenen, and K. Dures, “k-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction,” in International Conference on Big Data Analytics and Knowledge Discovery (DaWak), pp. 274–285, 2017. View at Google Scholar
  14. J. Yuan and Y. Tian, “Practical privacy-preserving mapreduce based k-means clustering over large-scale dataset,” IEEE Transactions on Cloud Computing, vol. PP, no. 99, pp. 1–12, 2017. View at Google Scholar
  15. F.-Y. Rao, B. K. Samanthula, E. Bertino, X. Yi, and D. Liu, “Privacy-preserving and outsourced multi-user k-means clustering,” in Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing, CIC 2015, pp. 80–89, October 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Huang, Q. Lu, and Y. Xiong, “Collaborative outsourced data mining for secure cloud computing,” Journal of Networks, vol. 9, no. 9, pp. 2655–2664, 2014. View at Google Scholar
  17. W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases,” in Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS '09), pp. 139–152, Providence, RI, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Wang, “Notes on two fully homomorphic encryption schemes without bootstrapping. Cryptology ePrint Archive,” Report 2015/519, 2015.
  19. S. De Capitani Di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: privacy risks and approaches,” in Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, pp. 1–9, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. P. Williams, R. Sion, and B. Carbunar, “Building castles out of mud: practical access pattern privacy and correctness on untrusted storage,” in Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08, pp. 139–148, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. R. Agrawal and R. Srikant, “Privacy-preserving data mining,” Proceedings of the ACM SIGMOD International Conference on Management of Data, vol. 29, no. 2, pp. 439–450, 2000. View at Publisher · View at Google Scholar · View at Scopus
  22. K. Liu, C. Giannella, and H. Kargupta, “An attacker’s view of distance preserving maps for privacy preserving data mining,” in Knowledge Discovery in Databases: PKDD 2006, vol. 4213 of Lecture Notes in Computer Science, pp. 297–308, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  23. B. Yao, F. Li, and X. Xiao, “Secure nearest neighbor revisited,” in Proceedings of the IEEE 29th International Conference on Data Engineering (ICDE '13), pp. 733–744, IEEE, Brisbane, Australia, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. J. Dean and S. Ghemawat, “MapReduce: simplified data processing on large clusters,” Communications of the ACM, vol. 51, no. 1, pp. 107–113, 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. W. Zhao, H. Ma, and Q. He, “Parallel k-means clustering based on mapreduce,” in Journal of Cloud Computing, vol. 5931, pp. 674–679, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  26. B. K. K. Samanthula, H. Chun, and W. Jiang, “An efficient and probabilistic secure bit-decomposition,” in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, pp. 541–546, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. A. López, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption,” in Proceedings of the 2012 (ACM) Symposium on Theory of Computing, pp. 1219–1234, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  28. A. Peter, E. Tews, and S. Katzenbeisser, “Efficiently outsourcing multiparty computation under multiple keys,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2046–2058, 2013. View at Publisher · View at Google Scholar · View at Scopus
  29. B. Wang, M. Li, S. S. M. Chow, and H. Li, “A tale of two clouds: computing on data encrypted under multiple keys,” in Proceedings of the 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 337–345, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. T.-Y. Youn, Y.-H. Park, C. H. Kim, and J. Lim, “An efficient public key cryptosystem with a privacy enhanced double decryption mechanism,” in Selected Areas in Cryptography, vol. 3897, pp. 144–158, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  31. E. Bresson, D. Catalano, and D. Pointcheval, “A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications,” in Advances in Cryptology—(ASIACRYPT) 2003, vol. 2894, pp. 37–54, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  32. E. Kiltz and J. Malone-Lee, “A general construction of IND-CCA2 secure public key encryption,” in Cryptography and Coding, vol. 2898, pp. 152–166, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  33. D. Galindo and J. Herranz, “On the security of public key cryptosystems with a double decryption mechanism,” Information Processing Letters, vol. 108, no. 5, pp. 279–283, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  34. M. D. Van and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing,” HotSec'10, pp. 1–8, 2010. View at Google Scholar
  35. S. S. M. Chow, J. H. Lee, and M. Strauss, “Two-party computation model for privacy-preserving queries over distributed databases,” NDSS, 2009. View at Google Scholar
  36. X. Liu, R. H. Deng, K.-K. R. Choo, and J. Weng, “An efficient privacy-preserving outsourced calculation toolkit with multiple keys,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2401–2414, 2016. View at Publisher · View at Google Scholar · View at Scopus
  37. B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “K-nearest neighbor classification over semantically secure encrypted relational data,” IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 5, pp. 1–14, 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. J. L. Reyes-Ortiz, L. Oneto, and D. Anguita, “Big data analytics in the cloud: spark on hadoop vs MPI/OpenMP on Beowulf,” Procedia Computer Science, vol. 53, no. 1, pp. 121–130.
  39. X. Meng, J. Bradley, B. Yavuz, E. Sparks, and S. Venkataraman, “MLlib: machine learing in apache spark,” Journal of Machine Learning Research, vol. 17, no. 1, pp. 1235–12414, 2015. View at Google Scholar
  40. J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd edition, 2011.
  41. O. Goldreich, “Basic Applications,” in The Foundations of Cryptography, vol. 2, Cambridge University Press, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  42. R. Peralta, Report on Integer Factorization, 2001, http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1025_report.pdf.
  43. M. Naeem and S. Asghar, “KEGG Metabolic Reaction Network Data Set,” The UCI KDD Archive, 1999, http://archive.ics.uci.edu/ml/datasets/KEGG+Metabolic+Reaction+Network+(Undirected).
  44. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology—(EUROCRYPT) '99 (Prague), vol. 1592, pp. 223–238, Springer, Berlin, Germany, 1999. View at Publisher · View at Google Scholar · View at MathSciNet