Skip to main content

A Secure Density Peaks Clustering Algorithm on Cloud Computing

  • Conference paper
  • First Online:
  • 1070 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Abstract

Cloud computing provides users with the convenience of data outsourcing computing at risk of privacy leakage, and clustering algorithms have high computational overhead when dealing with large datasets. Aiming at the above problems, this paper presents a security density peak clustering algorithm based on grid in hybrid cloud environment. First, the client uses the homomorphic encryption method to build the encrypted objects with user datasets. Second, the client uploads the encrypted objects to the cloud servers to implement the security protocols proposed in this paper. Finally, the cloud servers return the perturbation clustering results to the client to eliminate the disturbance. In the proposed scheme, only encryption and removing perturbation are performed on the client, ensuring that the client has lower computational complexity. Security analysis and experimental results show that the scheme proposed in this paper can improve the efficiency and accuracy of clustering algorithm under the premise of protecting user privacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yin, S., Kaynak, O.: Big data for modern industry: challenge and trends. Proc. IEEE 103(2), 143–146 (2015)

    Article  Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  3. Fang, S.: An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans. Ind. Inform. 10(1), 548–558 (2014)

    Article  Google Scholar 

  4. Ma, M., He, D., Kumar, N., Choo, K.K., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans. Ind. Inform. 14(2), 759–767 (2018)

    Article  Google Scholar 

  5. Esposito, C., Castiglione, A., Martini, B., Choo, K.K.: Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput. 3(4), 16–22 (2016)

    Article  Google Scholar 

  6. Zhang, Q., Yang, L.T., Chen, Z., Fan, Y.B.: PPHOCFS: privacy preserving high-order CFS algorithm on the cloud for clustering multimedia data. ACM Trans. Multimed. Comput. Commun. Appl. 12(4), 66:1–66:15 (2016)

    Google Scholar 

  7. Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ICCS), pp. 123–134 (2014)

    Google Scholar 

  8. Rao, F.-Y., Samanthula, B.K., Bertino, E., Yi, X., Liu, D.: Privacy-preserving and out- sourced multi-user k-means clustering. In: IEEE Conference on Collaboration and Internet Computing (CIC), pp. 80–89 (2015)

    Google Scholar 

  9. Samanthula, B.K., Elmehdwi, Y., Jiang, W.: K-nearest neighbor classification over seman tically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261–1273 (2015)

    Article  Google Scholar 

  10. Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypt-ed data. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium, pp. 8–11 (2015)

    Google Scholar 

  11. Veugen, T.: Encrypted integer division and secure comparison. Int. J. Appl. Crypt. 3(2), 166–180 (2014)

    Article  MathSciNet  Google Scholar 

  12. Zhao, Y.L., Yang, L.T., Sun, J.Y.: A secure high-order CFS algorithm on clouds for industrial internet of things. IEEE Trans. Ind. Informat. 14(8), 3766–3774 (2018)

    Article  Google Scholar 

  13. Goldreich, O.: Foundations of Cryptography. Basic Applications. Cambridge University Press, Cambridge (2004)

    Book  Google Scholar 

  14. Macqueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability (BSMSP), pp. 281–297 (1967)

    Google Scholar 

  15. Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China under Grant 61602009 and Grant 61672039, and the Anhui Provincial Natural Science Foundation of China under Grant 1808085MF172.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liping Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ci, S., Sun, L., Liu, X., Du, T., Zheng, X. (2019). A Secure Density Peaks Clustering Algorithm on Cloud Computing. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics