New privacy preserving clustering methods for secure multiparty computation

Many researches on privacy preserving data mining have been done. Privacy preserving data mining can be achieved in variousways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Further, in order to increase thesecurity of data mining, secure multiparty computation (SMC) has been introduced. Most of works in SMC are developed onapplying the model of SMC on different data distributions such as vertically, horizontally and arbitrarily partitioned data. Anothertype of SMC with sharing data itself to each party attracts attention, and some studies have been done. A simple method to sharedata was proposed and it was applied to statistical computation. However, for SMC, complicated computation such as data mininghas never been proposed. In the previous paper, we proposed a BP learning for SMC and showed the effectiveness of it. In thispaper, we propose clustering methods such as k-means and NG for SMC and show the effectiveness in numerical simulation.

[1]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Thomas Martinetz,et al.  'Neural-gas' network for vector quantization and its application to time-series prediction , 1993, IEEE Trans. Neural Networks.

[4]  Usama M. Fayyad,et al.  Knowledge Discovery in Databases: An Overview , 1997, ILP.

[5]  Yücel Saygin,et al.  Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.

[6]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[7]  Norio Shiratori,et al.  New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.

[8]  Shucheng Yu,et al.  Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[10]  Noritaka Shigei,et al.  A Proposal of Back Propagation Learning for Secure Multi-Party Computation Methods , 2016 .

[11]  Ueli Maurer,et al.  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.

[12]  Dr. T. Karthikeyan,et al.  Survey on Recent Algorithms for Privacy Preserving Data mining , 2015 .

[13]  Christopher J. Merz,et al.  UCI Repository of Machine Learning Databases , 1996 .

[14]  Noritaka Shigei,et al.  Performance Comparison of Hybrid Electromagnetism-Like Mechanism Algorithms with Descent Method , 2015, J. Artif. Intell. Soft Comput. Res..

[15]  Luis Orozco-Barbosa,et al.  Privacy Preserving k-Means Clustering in Multi-Party Environment , 2007, SECRYPT.

[16]  K. Srinathan,et al.  Efficient Privacy Preserving K-Means Clustering , 2010, PAISI.

[17]  N Valli PRIVACY PRESERVING BACK-PROPAGATION NEURAL NETWORK LEARNING USING CLOUD COMPUTING , 2015 .

[18]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[19]  N. Rajesh,et al.  Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms , 2016 .

[20]  Nico Schlitter,et al.  A Protocol for Privacy Preserving Neural Network Learning on Horizontally Partitioned Data , 2008 .