Abstract
The paper introduces the concept of \(\varPhi \)-data, data that is a proxy for some underlying data that offers advantages of data privacy and security while at the same time allowing particular data mining operations without requiring data owner participation once the proxy has been generated. The nature of the proxy representation is dependent on the nature of the desired data mining to be undertaken. Secure collaborative clustering is considered where the \(\varPhi \)-data is in the form of a Super Secure Chain Distance Matrices (SSCDM) encrypted using a proposed Multi-User Order Preserving Encryption (MUOPE) scheme. SSCDMs can be produced with respect to horizontal and vertical data partitioning. The DBSCAN clustering algorithm is adopted for illustrative and evaluation purposes. The results indicate that the proposed solution is efficient and produces comparable clustering configurations to those produced using an unencrypted, “standard”, algorithm; while maintaining data privacy and security.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Aggarwal, C.C., Yu, P.S.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 11–52. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-70992-5_2
Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. 29(2), 439–450 (2000)
Anikin, I.V., Gazimov, R.M.: Privacy preserving DBSCAN clustering algorithm for vertically partitioned data in distributed systems. In: IEEE International Siberian Conference on Control and Communications, pp. 1–4. IEEE (2017)
Bhaduri, K., Stefanski, M.D., Srivastava, A.N.: Privacy-preserving outlier detection through random nonlinear data distortion. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 41(1), 260–272 (2011)
Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 120–127. ACM (1999)
Chen, K., Liu, L.: Privacy-preserving multiparty collaborative mining with geometric data perturbation. IEEE Trans. Parallel Distrib. Syst. 20(12), 1764–1776 (2009)
Ester, M., Kriegel, H.P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD 1996, pp. 226–231 (1996)
Jiang, D., Xue, A., Ju, S., Chen, W., Ma, H.: Privacy-preserving DBSCAN on horizontally partitioned data. In: IEEE International Symposium on Medicine and Education, pp. 1067–1072. IEEE (2008)
Kumar, K.A., Rangan, C.P.: Privacy preserving DBSCAN algorithm for clustering. In: Alhajj, R., Gao, H., Li, J., Li, X., Zaïane, O.R. (eds.) ADMA 2007. LNCS (LNAI), vol. 4632, pp. 57–68. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73871-8_7
Lichman, M.: UCI machine learning repository (2013). http://archive.ics.uci.edu/ml
Liu, D., Wang, S.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput. Pract. Exp. 25(13), 1967–1984 (2013)
Liu, J., Xiong, L., Luo, J., Huang, J.Z.: Privacy preserving distributed DBSCAN clustering. Trans. Data Priv. 6(1), 69–85 (2013)
Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2016)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Rahman, M.S., Basu, A., Kiyomoto, S.: Towards outsourced privacy-preserving multiparty DBSCAN. In: 22nd IEEE Pacific Rim International Symposium on Dependable Computing, pp. 225–226. IEEE (2017)
Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53–65 (1987)
Tong, Q., Li, X., Yuan, B.: Efficient distributed clustering using boundary information. Neurocomputing 275, 2355–2366 (2018)
Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE (1982)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Almutairi, N., Coenen, F., Dures, K. (2018). Secure Third Party Data Clustering Using \(\varPhi \) Data: Multi-User Order Preserving Encryption and Super Secure Chain Distance Matrices (Best Technical Paper). In: Bramer, M., Petridis, M. (eds) Artificial Intelligence XXXV. SGAI 2018. Lecture Notes in Computer Science(), vol 11311. Springer, Cham. https://doi.org/10.1007/978-3-030-04191-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-04191-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04190-8
Online ISBN: 978-3-030-04191-5
eBook Packages: Computer ScienceComputer Science (R0)