Two-party privacy-preserving agglomerative document clustering

被引:0
|
作者
Su, Chunhua [1 ]
Zhou, Jianying [2 ]
Bao, Feng [2 ]
Takagi, Tsuyoshi [3 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Inst Infocomm Res, SSD, Singapore, Singapore
[3] Future Univ, Sch Syst Informat Sci, Hakodate, Hokkaido, Japan
关键词
documents clustering; privacy-preserving; cryptographic protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Document clustering is a powerful data mining technique to analyze the large amount of documents and structure large sets of text or hypertext documents. Many organizations or companies want to share their documents in a similar theme to get the joint benefits. However, it also brings the problem of sensitive information leakage without consideration of privacy. In this paper, we propose a cryptography-based framework to do the privacy-preserving document clustering among the users under the distributed environment: two parties, each having his private documents, want to collaboratively execute agglomerative document clustering without disclosing their private contents.
引用
收藏
页码:193 / +
页数:3
相关论文
共 50 条
  • [1] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
    Akhter, Rahena
    Chowdhury, Rownak Jahan
    Emura, Keita
    Islam, Tamzida
    Rahman, Mohammad Shahriar
    Rubaiyat, Nusrat
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126
  • [2] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    [J]. ENTROPY, 2020, 22 (12) : 1 - 15
  • [3] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250
  • [4] Privacy-preserving two-party computation of line segment intersection
    Sheidani, Sorour
    Zarei, Alireza
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3415 - 3432
  • [5] Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings
    Memis, Burak
    Yakut, Ibrahim
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2948 - 2966
  • [6] Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering
    Forg, Fabian
    Wetzel, Susanne
    Meyer, Ulrike
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 107 - 114
  • [7] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [8] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [9] Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity
    Beck, Martin
    Kerschbaum, Florian
    [J]. 2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 31 - 37
  • [10] Application of Secure Two-Party Computation in a Privacy-Preserving Android App
    De Vincenzi, Marco
    Martinelli, Fabio
    Matteucci, Ilaria
    Sebastio, Stefano
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,