Security and Communication Networks / 2020 / Article / Tab 1

Research Article

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing

Table 1



KNumber of clusters
LNumber of total data records
mDimension of data records
IMaximum number of iterations
nNumber of data owners
Number of data records of i-th owner
i-th data record with
i-th cluster with
Number of data records in cluster
Cluster center of i-th cluster
Euclidean distance between vectors and
DOii-th data owner with
QCQuery client
CCSCloud computing service
KMSKey management server
λThe security parameter
Two primes of the form
The cyclic group of quadratic residue modolo
and its order is
Master secret key in BCP encryption
Public key and secret key in BCP encryption
Symmetric key used in AES encryption
Scaled squared distance between and
Location matrix of n records in k clusters

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.