[1]姚禹丞,宋玲,鄂驰. 同态加密的分布式K均值聚类算法研究[J].计算机技术与发展,2017,27(02):81-85.
 YAO Yu-cheng,SONG Ling,E Chi. Investigation on Distributed K-means Clustering Algorithm of Homomorphic Encryption[J].,2017,27(02):81-85.
点击复制

 同态加密的分布式K均值聚类算法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年02期
页码:
81-85
栏目:
安全与防范
出版日期:
2017-02-10

文章信息/Info

Title:
 Investigation on Distributed K-means Clustering Algorithm of Homomorphic Encryption
文章编号:
1673-629X(2017)02-0081-05
作者:
 姚禹丞宋玲鄂驰
 广西大学计算机与电子信息学院
Author(s):
 YAO Yu-chengSONG LingE Chi
关键词:
 分布式K均值聚类同态加密隐私保护
Keywords:
 distributedK-meanshomomorphic encryptionprivacy protection
分类号:
TP301.6
文献标志码:
A
摘要:
 针对分布式环境下多方联合执行K均值聚类挖掘任务过程中存在的安全性问题,如潜在的合谋攻击和窃听攻击导致隐私泄露和敏感知识被发现,提出了一种隐私保护算法(PPDK).在数据对象水平分布的情况下,该算法利用同态加密的思想,设计了一种新的加密机制.通过改进加密密钥的生成方式,使得参与计算的各方持有不同的密钥,对于产生的密文,其他参与方无法解密,并且在计算过程中所有的加密解密操作均由各参与方独立完成,因此可以限制半诚实的参与方试图窃听其他参与方的私有信息,以及与中心站点合谋揭露隐私的可能性.通过理论分析和实验结果表明,在有效的时间内,PPDK算法可以在确保分布式K均值聚类挖掘任务得到正确结果的前提下,很好地保护数据的隐私性.
Abstract:
 Aiming at security problems in the process of multi parties performing K-mean clustering mining task under distributed environment,such as potential collusion attacks and eavesdropping attacks leading to privacy disclosure and sensitive knowledge to be found,a privacy protection algorithm,PPDK,is proposed.In the case of the horizontal distribution of the data objects,this algorithm has designed a new encryption mechanism based on the idea of the homomorphic encryption.By improving the generation of the encryption key,it makes each parties hold different keys.One party can’t decrypt the cipher generated by other parties.And in the process of calculating,all encryption and decryption operations are executed by the participants independently.Therefore,it can limit the possibility of semi honest parties trying to eavesdrop the other parties’ private information and conspire with center site.Theoretical analysis and experimental results show that within the effective time,PPDK algorithm can ensure that the distributed K-means clustering mining tasks get a correct results,and the privacy of the data has a very good protection.

相似文献/References:

[1]张林才 张燕 王红霞.节点对等WebSpider设计与实现[J].计算机技术与发展,2010,(03):195.
 ZHANG Lin-cai,ZHANG Yan,WANG Hong-xia.Design and Realization of Peer - to - Peer Web Spider[J].,2010,(02):195.
[2]胡欣杰 路川.分布式信息处理系统的对象定位研究[J].计算机技术与发展,2009,(06):148.
 HU Xin-jie,LU Chuan.Research of Object Orientation of Distributed Information System[J].,2009,(02):148.
[3]郑勇 卢捍华 孙雁飞 闵丽娟 王亚石.基于Ajax和CORBA中间件的分布式订单管理系统[J].计算机技术与发展,2009,(08):201.
 ZHENG Yong,LU Han-hua,SUN Yan-fei,et al.A Distributed Order Management System Based on Ajax and CORBA Middleware[J].,2009,(02):201.
[4]谢慧婷 孙力娟 肖甫 王光辉.卫星网络控制系统体系结构研究[J].计算机技术与发展,2009,(10):207.
 XIE Hui-ting,SUN Li-juan,XIAO Fu,et al.Research on Satellite Network Control System Structure[J].,2009,(02):207.
[5]王君 祝永志 魏榕晖 李丙锋.基于Oracle分布式数据库的查询优化[J].计算机技术与发展,2008,(01):157.
 WANG Jun,ZHU Yong-zhi,WEI Rong-hui,et al.Optimizing of Query Based on Oracle Distributed Database[J].,2008,(02):157.
[6]李兵.一种基于对等模型的网络入侵检测系统模型[J].计算机技术与发展,2008,(03):173.
 LI Bing.A Distributed Intrusion Detection System Based on Peer - to - Peer Model[J].,2008,(02):173.
[7]边志伟 王击 覃业梅.火灾报警与联动控制系统实验装置的设计[J].计算机技术与发展,2008,(09):173.
 BIAN Zhi-wei,WANG Ji,QIN Ye-mei.Design of Experimental Device of Alarm and Control Linkage for Fires[J].,2008,(02):173.
[8]马子鹏.分布式电信网漏洞管理系统的研究与设计[J].计算机技术与发展,2010,(07):145.
 MA Zi-peng.Research and Design of Distributed Telecommunication Network Vulnerability Management System[J].,2010,(02):145.
[9]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(02):96.
[10]乐晓波 李京京 唐贤瑛.基于Petri net建模的资源调度的蚁群算法[J].计算机技术与发展,2006,(01):44.
 YUE Xiao-bo,LI Jing-jing,TANG Xian-ying.An Ant Colony Optimization Algorithm of Resource Scheduling Based on Petri net[J].,2006,(02):44.
[11]陈哲,封卫兵. 基于分布式数值模拟结果的可视化[J].计算机技术与发展,2014,24(12):155.
 CHEN Zhe,FENG Wei-bing. Visualization Based on Distributed Numerical Simulation Result[J].,2014,24(02):155.
[12]张发扬,李玲娟,陈煜. VFDT算法基于Storm平台的实现方案[J].计算机技术与发展,2016,26(09):192.
 ZHANG Fa-yang,LI Ling-juan,CHEN Yu. Implementation Scheme of VFDT Algorithm on Storm Platform[J].,2016,26(02):192.
[13]万新贵,李玲娟,马可. 分布式数据流聚类算法及其基于Storm的实现[J].计算机技术与发展,2017,27(07):150.
 WAN Xin-gui,LI Ling-juan,MA Ke. Distributed Data Stream Clustering Algorithm and Its Implementation with Storm[J].,2017,27(02):150.

更新日期/Last Update: 2017-05-11