Privacy Preserving Data Mining in Terms of DBSCAN Clustering Algorithm in Distributed Systems

We raise an issue of information security in distributed data mining systems. Authors compare two approaches aimed to protect security of processed data in distributed systems: with the assistance of trusted third party and without it. An in-depth description of external and internal adversary capabilities to violate privacy, availability and entirety of processing data shows major drawbacks of approach based on attraction of trusted third party. The opposite approach is founded on the organization of secure channel which is based on homomorfic and asymmetric encryption. A privacy-preserving DBSCAN clustering algorithm over vertically partitioned data is demonstrated.

[1]  M. Naga Lakshmi,et al.  SVD based Data Transformation Methods for Privacy Preserving Clustering , 2013 .

[2]  Lotfi A. Zadeh A Summary and Update of “Fuzzy Logic” , 2010, 2010 IEEE International Conference on Granular Computing.

[3]  Chris Clifton,et al.  Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.

[4]  Vitaly Shmatikov,et al.  Privacy-Preserving Classifier Learning , 2009, Financial Cryptography.

[5]  Chris Clifton,et al.  Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.

[6]  I. Anikin,et al.  Pseudo-random number generator based on fuzzy logic , 2016, 2016 International Siberian Conference on Control and Communications (SIBCON).

[7]  Animesh Tripathy,et al.  A Secure Two Party Hierarchical Clustering Approach for Vertically Partitioned Data Set with Accuracy Measure , 2013, ISI.

[8]  lgor Anikin,et al.  New Type of Takagi-Sugeno Fuzzy Inference System as Universal Approximator , 2014 .

[9]  Somesh Jha,et al.  Privacy Preserving Clustering , 2005, ESORICS.

[10]  I. Anikin,et al.  Fuzzy control based on new type of Takagi-Sugeno fuzzy inference system , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).

[11]  Shouhuai Xu,et al.  Privacy-Preserving Decision Tree Mining Based on Random Substitutions , 2006, ETRICS.

[12]  A. M. Natarajan,et al.  An Effective Data Transformation Approach for Privacy Preserving Clustering , 2008 .

[13]  Yanchun Zhang,et al.  Equally contributory privacy-preserving k-means clustering over vertically partitioned data , 2013, Inf. Syst..

[14]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[15]  I. Anikin,et al.  Fuzzy stream cipher system , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).

[16]  Igor V. Anikin,et al.  Privacy preserving DBSCAN clustering algorithm for vertically partitioned data in distributed systems , 2017, 2017 International Siberian Conference on Control and Communications (SIBCON).

[17]  N. Mookhambika,et al.  PRIVACY PRESERVING DECISION TREE LEARNING USING UNREALIZED DATA SETS , 2013 .

[18]  Keita Emura,et al.  Privacy-Preserving Two-Party k-Means Clustering in Malicious Model , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.