Seminars

View all Seminars  |  Download ICal for this event

Towards Efficient Privacy-Preserving Two-Party k-Means Clustering Protocol

Series: M.Tech (Research) Thesis Defence -ONLINE

Speaker: Ms. Chim Sonali Eknath M.Tech. (Research) student Dept. of CSA

Date/Time: Jun 30 11:00:00

Location: Microsoft Teams - ONLINE

Faculty Advisor: Prof. Sanjit Chatterjee

Abstract:
Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to obtain collaborative data mining results is growing and so is the need for privacy-preserving data mining protocols. Clustering is one of the data mining techniques and one of the popular clustering algorithms is k-means clustering. We studied the recent work for the secure two-party k-means clustering by Bunn and Ostrovosky and found that the protocol is inefficient for practical purposes. The protocol requires communication rounds which are linear in security parameter for the center initialization step and are quadratic in security parameter for an iterative Lloyds step of the k-means clustering algorithm. The challenge in the secure two-party k-means clustering is the exorbitant communication cost occurring due to the high number of interactions between the parties for performing computations on the data. Our work attempts to resolve this problem of inefficiency in k-means clustering protocol in a two-party setting by proposing some modifications. We have come up with two comparison protocols that are required in the k-means clustering protocol. One of the protocols is to find a minimum of two shared numbers which runs in constant communication rounds. Using this protocol as a building block, another protocol is designed to find a minimum of n shared numbers, which runs in O(n) communication rounds. We have also improved a protocol that selects a random value from a domain oblivious to both parties. Apart from this, the idea to avoid the two-party integer division altogether is incorporated in the k-means clustering protocol. With these improvements, we propose a two-party k-means clustering protocol for which the initialization step requires communication rounds linear in security parameter and Lloyds step requires communications rounds that are independent of the security parameter. The protocol provides a security guarantee in the semi-honest model except for some minor information leakage. We argue that this leakage in the protocol can be tolerated considering the substantial gain in the communication cost We have verified the gain in performance of the modified protocol by implementing both the k-means clustering protocols and running their instances in the same set-up

Microsoft Teams link: ONLINE
https://teams.microsoft.com/l/meetup-join/19%3ameeting_MWFjODE3MDQtNGVlYy00MmU2LTkzNzEtY2ZmNTUxYTdjMTE0%40thread.v2/0?context=%7b%22Tid%22%3a%226f15cd97-f6a7-41e3-b2c5-ad4193976476%22%2c%22Oid%22%3a%229be1cf83-a6ec-4e58-a5ca-b440a35ae199%22%7d

Speaker Bio:

Host Faculty: