Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection k-means clustering method

A privacy protection and clustering method technology, applied in the fields of instruments, character and pattern recognition, computer parts, etc., can solve the problems of inapplicability of databases and less data mining work, and achieve a wide range of applications and good clustering accuracy. Effect

Active Publication Date: 2018-06-12
WUHAN UNIV OF TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

NDB also supports distance metrics, but there is little work applying NDB to privacy-preserving data mining
Existing work has proved that negative databases can be used for clustering and classification to protect the privacy of the original data, but the existing privacy-preserving clustering algorithms are based on the Hamming distance, which is not applicable to most databases, and now Many clustering algorithms are based on Euclidean distance, therefore, it is necessary to propose a privacy-preserving clustering algorithm based on Euclidean distance on the negative database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection k-means clustering method
  • Privacy protection k-means clustering method
  • Privacy protection k-means clustering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below with reference to the accompanying drawings and embodiments. A privacy protection k-means clustering method based on a negative database in this embodiment includes:

[0030] Step 1. Convert each piece of data of X in the database that needs to be clustered into a binary string. Here, take the iris data set commonly used for clustering as an example. There are 150 instances in the iris data set, and each instance contains 4 The attributes are all floating-point numbers. Here, the floating-point number is multiplied by 10 and converted into a decimal number, and then the decimal number is converted into a binary number. Since the length of each binary string must be the same, the remaining bits are filled with 0. For example, if the value of a certain attribute is 3.5, the converted binary number is 10011. If the maximum number of digits of this attribute is six digits, add zeros in front to make up six digits, that is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a negative-database-based privacy protection k-means clustering method. The method comprises the steps that each data of X in a database needing to be clustered is converted into a binary string, each binary string generates a corresponding negative database through a K-hidden algorithm; k different binary strings are generated randomly to serve as an initial clustering center; for each negative database (shown in the description), the Euclidean distance from the negative database to each clustering center is calculated, and the negative database is divided to the clustering center with the minimal Euclidean distance; for each cluster, the clustering center is recalculated; iteration is repeated till the clustering center does not change any more. Accordingly, theexisting negative-database-based k-means algorithm clustering precision can be improved, and the provided Euclidean distance estimation method can be used for other data mining algorithms to protect data privacy.

Description

Technical field [0001] The invention belongs to the field of privacy protection and security, and specifically relates to a privacy-protected k-means clustering method formed by using a negative database to protect the data privacy of the k-means algorithm. Background technique [0002] With the rapid development of computer technology, a large amount of data is produced, which also makes data mining technology develop rapidly. Many data mining algorithms have been proposed, such as k-means algorithm, k-nearest neighbor algorithm and so on. These data mining algorithms do not protect data security during operation, which may cause the user's private information to be leaked. As people pay more and more attention to privacy information, data mining for privacy protection has become particularly important. [0003] Negative database (NDB) is inspired by the artificial immune system. Unlike traditional databases, negative databases store information that is not in traditional databa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62
CPCG06F18/23213
Inventor 赵冬冬胡小意向剑文
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products