Research Article
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing
| Symbol | Meaning |
| K | Number of clusters | L | Number of total data records | m | Dimension of data records | I | Maximum number of iterations | n | Number of data owners | | Number of data records of i-th owner | | i-th data record with | | i-th cluster with | | Number of data records in cluster | | Cluster center of i-th cluster | | Euclidean distance between vectors and | DOi | i-th data owner with | QC | Query client | CCS | Cloud computing service | KMS | Key management server | λ | The security parameter | | Two primes of the form | | | | The cyclic group of quadratic residue modolo | | and its order is | | Master secret key in BCP encryption | | Public key and secret key in BCP encryption | | Symmetric key used in AES encryption | | | | Scaled squared distance between and | | Location matrix of n records in k clusters |
|
|