Abstract
Cloud computing provides users with the convenience of data outsourcing computing at risk of privacy leakage, and clustering algorithms have high computational overhead when dealing with large datasets. Aiming at the above problems, this paper presents a security density peak clustering algorithm based on grid in hybrid cloud environment. First, the client uses the homomorphic encryption method to build the encrypted objects with user datasets. Second, the client uploads the encrypted objects to the cloud servers to implement the security protocols proposed in this paper. Finally, the cloud servers return the perturbation clustering results to the client to eliminate the disturbance. In the proposed scheme, only encryption and removing perturbation are performed on the client, ensuring that the client has lower computational complexity. Security analysis and experimental results show that the scheme proposed in this paper can improve the efficiency and accuracy of clustering algorithm under the premise of protecting user privacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yin, S., Kaynak, O.: Big data for modern industry: challenge and trends. Proc. IEEE 103(2), 143–146 (2015)
Armbrust, M., Fox, A., Griffith, R.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Fang, S.: An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans. Ind. Inform. 10(1), 548–558 (2014)
Ma, M., He, D., Kumar, N., Choo, K.K., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans. Ind. Inform. 14(2), 759–767 (2018)
Esposito, C., Castiglione, A., Martini, B., Choo, K.K.: Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput. 3(4), 16–22 (2016)
Zhang, Q., Yang, L.T., Chen, Z., Fan, Y.B.: PPHOCFS: privacy preserving high-order CFS algorithm on the cloud for clustering multimedia data. ACM Trans. Multimed. Comput. Commun. Appl. 12(4), 66:1–66:15 (2016)
Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ICCS), pp. 123–134 (2014)
Rao, F.-Y., Samanthula, B.K., Bertino, E., Yi, X., Liu, D.: Privacy-preserving and out- sourced multi-user k-means clustering. In: IEEE Conference on Collaboration and Internet Computing (CIC), pp. 80–89 (2015)
Samanthula, B.K., Elmehdwi, Y., Jiang, W.: K-nearest neighbor classification over seman tically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261–1273 (2015)
Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypt-ed data. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium, pp. 8–11 (2015)
Veugen, T.: Encrypted integer division and secure comparison. Int. J. Appl. Crypt. 3(2), 166–180 (2014)
Zhao, Y.L., Yang, L.T., Sun, J.Y.: A secure high-order CFS algorithm on clouds for industrial internet of things. IEEE Trans. Ind. Informat. 14(8), 3766–3774 (2018)
Goldreich, O.: Foundations of Cryptography. Basic Applications. Cambridge University Press, Cambridge (2004)
Macqueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability (BSMSP), pp. 281–297 (1967)
Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)
Acknowledgment
This work is supported by the National Natural Science Foundation of China under Grant 61602009 and Grant 61672039, and the Anhui Provincial Natural Science Foundation of China under Grant 1808085MF172.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ci, S., Sun, L., Liu, X., Du, T., Zheng, X. (2019). A Secure Density Peaks Clustering Algorithm on Cloud Computing. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_43
Download citation
DOI: https://doi.org/10.1007/978-3-030-37337-5_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37336-8
Online ISBN: 978-3-030-37337-5
eBook Packages: Computer ScienceComputer Science (R0)