Two-party privacy-preserving agglomerative document clustering

被引:0
|
作者
Su, Chunhua [1 ]
Zhou, Jianying [2 ]
Bao, Feng [2 ]
Takagi, Tsuyoshi [3 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Inst Infocomm Res, SSD, Singapore, Singapore
[3] Future Univ, Sch Syst Informat Sci, Hakodate, Hokkaido, Japan
关键词
documents clustering; privacy-preserving; cryptographic protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Document clustering is a powerful data mining technique to analyze the large amount of documents and structure large sets of text or hypertext documents. Many organizations or companies want to share their documents in a similar theme to get the joint benefits. However, it also brings the problem of sensitive information leakage without consideration of privacy. In this paper, we propose a cryptography-based framework to do the privacy-preserving document clustering among the users under the distributed environment: two parties, each having his private documents, want to collaboratively execute agglomerative document clustering without disclosing their private contents.
引用
下载
收藏
页码:193 / +
页数:3
相关论文
共 50 条
  • [41] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [42] Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations
    Zhang, Mingwu
    Mu, Yi
    COMPUTER JOURNAL, 2016, 59 (04): : 493 - 507
  • [43] AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization
    Luo, Yukui
    Xu, Nuo
    Peng, Hongwu
    Wang, Chenghong
    Duan, Shijin
    Mahmood, Kaleel
    Wen, Wujie
    Ding, Caiwen
    Xu, Xiaolin
    56TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2023, 2023, : 628 - 640
  • [44] Privacy preserving sequential pattern mining based on secure two-party computation
    Ouyang, Wei-Min
    Huang, Qin-Hua
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
  • [45] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
  • [46] Incremental clustering techniques for multi-party Privacy-Preserving Record Linkage
    Vatsalan, Dinusha
    Christen, Peter
    Rahm, Erhard
    DATA & KNOWLEDGE ENGINEERING, 2020, 128 (128)
  • [47] On the Complexity of Two-Party Differential Privacy
    Haitner, Iftach
    Mazor, Noam
    Silbak, Jad
    Tsfadia, Eliad
    PROCEEDINGS OF THE 54TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '22), 2022, : 1392 - 1405
  • [48] The Limits of Two-Party Differential Privacy
    McGregor, Andrew
    Mironov, Ilya
    Pitassi, Toniann
    Reingold, Omer
    Talwar, Kunal
    Vadhan, Salil
    2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 81 - 90
  • [49] Privacy-preserving clustering of data streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    Tamkang Journal of Science and Engineering, 2010, 13 (03): : 349 - 358
  • [50] The Research of Privacy-preserving Clustering Algorithm
    Shen, Yanguang
    Han, Junrui
    Shan, Huifang
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 324 - 327