An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography

被引:0
|
作者
Department of Computer Engineering, S. V. National Institute of Technology, Ichhchhanath, Surat, Gujarat, India [1 ]
不详 [2 ]
机构
来源
Int. J. Netw. Secur. | / 3卷 / 328-339期
关键词
Geometry - Privacy-preserving techniques - Public key cryptography - Costs;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose an approach that illustrates the application of Elliptic Curve Cryptography (ECC) in Privacy-preserving distributed K-Means Clustering over horizontally partitioned dataset. We believe that the conventional cryptographic approaches and secret sharing schemes for privacy-preserving distributed K-Means clustering, are not scalable due to the higher computational and communication cost. Elliptic Curve based cryptosystems offer much better key size to security ratio in comparison. Hence, we use ECC based ElGamal scheme in distributed K-Means clustering to preserve privacy. Our approach avoids multiple cipher operations at each site and hence is efficient in terms of computational cost. We also achieve a reduction in the communication cost by allowing parties to communicate in a ring topology. Our experimental results show that our approach is scalable in terms of dataset size and number of parties in a distributed scenario. We carry out comparative analysis of our approach with existing approaches to highlight the effectiveness of our approach.
引用
收藏
页码:328 / 339
相关论文
共 50 条
  • [31] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [32] Implementation and Performance Analysis of Elliptic Curve Cryptography using an Efficient Multiplier
    Renita, J.
    Elizabeth, Edna N.
    Asokan, Nandhini
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2022, 22 (02) : 53 - 60
  • [33] A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy
    Khaliq, Awais Abdul
    Anjum, Adeel
    Ajmal, Abdul Basit
    Webber, Julian L.
    Mehbodniya, Abolfazl
    Khan, Shawal
    IEEE ACCESS, 2022, 10 : 56410 - 56426
  • [34] An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Ruhul Amin
    SK Hafizul Islam
    G. P. Biswas
    Muhammad Khurram Khan
    Neeraj Kumar
    Journal of Medical Systems, 2015, 39
  • [35] An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [36] A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography
    Alshudukhi, Jalawi Sulaiman
    Al-Mekhlafi, Zeyad Ghaleb
    Mohammed, Badiea Abdulkarem
    IEEE ACCESS, 2021, 9 : 15633 - 15642
  • [37] Efficient and secure e-voting scheme using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Adhikari, Sharmistha
    Khan, Muhammad Khurram
    Dasgupta, Mou
    SECURITY AND PRIVACY, 2023, 6 (03)
  • [38] Efficient Transmission of PKI Certificates using Elliptic Curve Cryptography and its Variants
    Selvakumaraswamy, Shivkumar
    Govindaswamy, Umamaheswari
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (01) : 38 - 43
  • [39] Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
    Loretta, Irin G.
    Kavitha, V.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 821 - 836
  • [40] Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
    Irin Loretta G
    V. Kavitha
    Peer-to-Peer Networking and Applications, 2021, 14 : 821 - 836