Education, Science, Technology, Innovation and Life
Open Access
Sign In

Distributed Privacy-preserving Clustering Mining Algorithm for Heterogeneous Computing

Download as PDF

DOI: 10.23977/acss.2022.060707 | Downloads: 21 | Views: 490

Author(s)

Jing Qi 1

Affiliation(s)

1 College of Intelligent Equipment, Shandong University of Science and Technology, Taian, Shandong, 271019, China

Corresponding Author

Jing Qi

ABSTRACT

As a typical unsupervised data mining method, cluster analysis can mine unknown knowledge and potential value from massive data. However, in the process of mining useful information, the personal privacy information in the data may be leaked. Therefore, privacy protection technology comes into being. This paper focuses on the distributed privacy preserving clustering mining algorithm for heterogeneous computing. This thesis first constructs a mathematical model based on heterogeneous Hadoop. In order to further improve the availability of the algorithm, an effective algorithm DPk means ev is studied and proposed. The algorithm improves the selection of the initial central point and avoids the blindness of the value setting and the sensitivity of the initial central point selection. The experimental results show that the algorithm effectively improves the efficiency and availability of clustering.

KEYWORDS

Heterogeneous Computing, Distributed Architecture, Privacy Protection, Clustering Algorithm

CITE THIS PAPER

Jing Qi, Distributed Privacy-preserving Clustering Mining Algorithm for Heterogeneous Computing. Advances in Computer, Signals and Systems (2022) Vol. 6: 44-51. DOI: http://dx.doi.org/10.23977/acss.2022.060707.

REFERENCES

[1] Manikandan V, Porkodi V, Mohammed A S, et al. Privacy Preserving Data Mining Using Threshold Based Fuzzy Cmeans Clustering[J]. ICTACT Journal on Soft Computing, 2018, 9(1).
[2] Ram Mohan Rao P, Murali Krishna S, Siva Kumar A P. Privacy preservation techniques in big data analytics: a survey [J]. Journal of Big Data, 2018, 5(1): 1-12.
[3] Shaham S, Ding M, Liu B, et al. Privacy preserving location data publishing: A machine learning approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 33(9): 3270-3283.
[4] Varma G, Chauhan R, Yafi E. ARTYCUL: A privacy-preserving ML-driven framework to determine the popularity of a cultural exhibit on display [J]. Sensors, 2021, 21(4): 1527.
[5] Garg S, Kaur K, Kaddoum G, et al. SDN-based secure and privacy-preserving scheme for vehicular networks: A 5G perspective[J]. IEEE Transactions on Vehicular Technology, 2019, 68(9): 8421-8434.
[6] Upadhyay S, Sharma C, Sharma P, et al. Privacy preserving data mining with 3-D rotation transformation[J]. Journal of King Saud University-Computer and Information Sciences, 2018, 30(4): 524-530.
[7] Le Nguyen B, Lydia E L, Elhoseny M, et al. Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data[J]. Computers, Materials & Continua, 2020, 65(1): 87-107.
[8] Menaga D, Saravanan S. GA-PPARM: constraint-based objective function and genetic algorithm for privacy preserved association rule mining [J]. Evolutionary Intelligence, 2022, 15(2): 1487-1498.
[9] Keshk M, Turnbull B, Moustafa N, et al. A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks [J]. IEEE Transactions on Industrial Informatics, 2019, 16(8): 5110-5118.
[10] Usman M, Jan M A, He X, et al. P2DCA: A privacy-preserving-based data collection and analysis framework for IoMT applications [J]. IEEE Journal on Selected Areas in Communications, 2019, 37(6): 1222-1230.

Downloads: 12224
Visits: 249597

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.