Reference Hub7
Privacy-Preserving Hybrid K-Means

Privacy-Preserving Hybrid K-Means

Zhiqiang Gao, Yixiao Sun, Xiaolong Cui, Yutao Wang, Yanyu Duan, Xu An Wang
Copyright: © 2018 |Volume: 14 |Issue: 2 |Pages: 17
ISSN: 1548-3924|EISSN: 1548-3932|EISBN13: 9781522542650|DOI: 10.4018/IJDWM.2018040101
Cite Article Cite Article

MLA

Gao, Zhiqiang, et al. "Privacy-Preserving Hybrid K-Means." IJDWM vol.14, no.2 2018: pp.1-17. http://doi.org/10.4018/IJDWM.2018040101

APA

Gao, Z., Sun, Y., Cui, X., Wang, Y., Duan, Y., & Wang, X. A. (2018). Privacy-Preserving Hybrid K-Means. International Journal of Data Warehousing and Mining (IJDWM), 14(2), 1-17. http://doi.org/10.4018/IJDWM.2018040101

Chicago

Gao, Zhiqiang, et al. "Privacy-Preserving Hybrid K-Means," International Journal of Data Warehousing and Mining (IJDWM) 14, no.2: 1-17. http://doi.org/10.4018/IJDWM.2018040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how the most widely used clustering, k-means, is prone to fall into a local optimum. Notably, traditional clustering approaches are directly performed on private data and fail to cope with malicious attacks in massive data mining tasks against attackers' arbitrary background knowledge. It would result in violation of individuals' privacy, as well as leaks through system resources and clustering outputs. To address these issues, the authors propose an efficient privacy-preserving hybrid k-means under Spark. In the first stage, particle swarm optimization is executed in resilient distributed datasets to initiate the selection of clustering centroids in the k-means on Spark. In the second stage, k-means is executed on the condition that a privacy budget is set as ε/2t with Laplace noise added in each round of iterations. Extensive experimentation on public UCI data sets show that on the premise of guaranteeing utility of privacy data and scalability, their approach outperforms the state-of-the-art varieties of k-means by utilizing swarm intelligence and rigorous paradigms of differential privacy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.