Distributed Privacy-preserving Clustering Mining Algorithm for Heterogeneous Computing
DOI: 10.23977/acss.2022.060707 | Downloads: 21 | Views: 503
Author(s)
Jing Qi 1
Affiliation(s)
1 College of Intelligent Equipment, Shandong University of Science and Technology, Taian, Shandong, 271019, China
Corresponding Author
Jing QiABSTRACT
As a typical unsupervised data mining method, cluster analysis can mine unknown knowledge and potential value from massive data. However, in the process of mining useful information, the personal privacy information in the data may be leaked. Therefore, privacy protection technology comes into being. This paper focuses on the distributed privacy preserving clustering mining algorithm for heterogeneous computing. This thesis first constructs a mathematical model based on heterogeneous Hadoop. In order to further improve the availability of the algorithm, an effective algorithm DPk means ev is studied and proposed. The algorithm improves the selection of the initial central point and avoids the blindness of the value setting and the sensitivity of the initial central point selection. The experimental results show that the algorithm effectively improves the efficiency and availability of clustering.
KEYWORDS
Heterogeneous Computing, Distributed Architecture, Privacy Protection, Clustering AlgorithmCITE THIS PAPER
Jing Qi, Distributed Privacy-preserving Clustering Mining Algorithm for Heterogeneous Computing. Advances in Computer, Signals and Systems (2022) Vol. 6: 44-51. DOI: http://dx.doi.org/10.23977/acss.2022.060707.
REFERENCES
[1] Manikandan V, Porkodi V, Mohammed A S, et al. Privacy Preserving Data Mining Using Threshold Based Fuzzy Cmeans Clustering[J]. ICTACT Journal on Soft Computing, 2018, 9(1).
[2] Ram Mohan Rao P, Murali Krishna S, Siva Kumar A P. Privacy preservation techniques in big data analytics: a survey [J]. Journal of Big Data, 2018, 5(1): 1-12.
[3] Shaham S, Ding M, Liu B, et al. Privacy preserving location data publishing: A machine learning approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 33(9): 3270-3283.
[4] Varma G, Chauhan R, Yafi E. ARTYCUL: A privacy-preserving ML-driven framework to determine the popularity of a cultural exhibit on display [J]. Sensors, 2021, 21(4): 1527.
[5] Garg S, Kaur K, Kaddoum G, et al. SDN-based secure and privacy-preserving scheme for vehicular networks: A 5G perspective[J]. IEEE Transactions on Vehicular Technology, 2019, 68(9): 8421-8434.
[6] Upadhyay S, Sharma C, Sharma P, et al. Privacy preserving data mining with 3-D rotation transformation[J]. Journal of King Saud University-Computer and Information Sciences, 2018, 30(4): 524-530.
[7] Le Nguyen B, Lydia E L, Elhoseny M, et al. Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data[J]. Computers, Materials & Continua, 2020, 65(1): 87-107.
[8] Menaga D, Saravanan S. GA-PPARM: constraint-based objective function and genetic algorithm for privacy preserved association rule mining [J]. Evolutionary Intelligence, 2022, 15(2): 1487-1498.
[9] Keshk M, Turnbull B, Moustafa N, et al. A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks [J]. IEEE Transactions on Industrial Informatics, 2019, 16(8): 5110-5118.
[10] Usman M, Jan M A, He X, et al. P2DCA: A privacy-preserving-based data collection and analysis framework for IoMT applications [J]. IEEE Journal on Selected Areas in Communications, 2019, 37(6): 1222-1230.
Downloads: | 13167 |
---|---|
Visits: | 256121 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks