IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme

Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme
View Sample PDF
Author(s): Sankita Patel (S. V. National Institute of Technology, India), Mitali Sonar (Shankersinh Vaghela Bapu Institute of Technology, India)and Devesh C. Jinwala (S. V. National Institute of Technology, India)
Copyright: 2019
Pages: 27
Source title: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-8897-9.ch021

Purchase

View Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme on the publisher's website for pricing and purchasing information.

Abstract

In this article, the authors propose an approach for privacy preserving distributed clustering that assumes malicious model. In the literature, there do exist, numerous approaches that assume a semi honest model. However, such an assumption is, at best, reasonable in experimentations; rarely true in real world. Hence, it is essential to investigate approaches for privacy preservation using a malicious model. The authors use the Pederson's Verifiable Secret Sharing scheme ensuring the privacy using additively homomorphic secret sharing scheme. The trustworthiness of the data is assured using homomorphic commitments in Pederson's scheme. In addition, the authors propose two variants of the proposed approach - one for horizontally partitioned dataset and the other for vertically partitioned dataset. The experimental results show that the proposed approach is scalable in terms of dataset size. The authors also carry out experimentations to highlight the effectiveness of Verifiable Secret Sharing scheme against Zero Knowledge Proof scheme.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom