Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy-preserving k-means clustering method

A clustering method and privacy protection technology, which is applied in the field of privacy protection k-means clustering, can solve the problems of inapplicable database and less data mining work, and achieve the effect of wide application range and good clustering accuracy

Active Publication Date: 2021-12-17
WUHAN UNIV OF TECH
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

NDB also supports distance metrics, but there is little work applying NDB to privacy-preserving data mining
Existing work has proved that negative databases can be used for clustering and classification to protect the privacy of the original data, but the existing privacy-preserving clustering algorithms are based on the Hamming distance, which is not applicable to most databases, and now Many clustering algorithms are based on Euclidean distance, therefore, it is necessary to propose a privacy-preserving clustering algorithm based on Euclidean distance on the negative database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy-preserving k-means clustering method
  • A privacy-preserving k-means clustering method
  • A privacy-preserving k-means clustering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention is described in detail below in conjunction with accompanying drawing and embodiment, a kind of method for privacy protection k-means clustering based on negative database of the present embodiment comprises:

[0030] Step 1. Convert each piece of data X in the database that needs to be clustered into a binary string. Here, take the iris data set, a commonly used data set for clustering, as an example. There are 150 instances in the iris data set, and each instance contains 4 Attributes, all floating point numbers. Here, the floating-point number is multiplied by 10 and converted into a decimal number, and then the decimal number is converted into a binary number. Since the length of each binary string must be the same, the remaining bits are filled with 0. For example, the value of a certain attribute is 3.5, which is 10011 when it is converted into binary number. If the maximum value of this attribute has six digits, add 0 in front to make up six...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a privacy protection k-means clustering algorithm based on a negative database, comprising: converting each piece of data of X in a database that needs to be clustered into a binary string, and performing a K-hidden algorithm for each binary string Generate the corresponding negative database; randomly generate k different binary strings as the initial cluster center; calculate the Euclidean distance from the negative database to each cluster center for each negative database, and divide the negative database to the cluster with the smallest Euclidean distance Class center; for each cluster, recalculate the cluster center; repeat the iteration until the cluster center no longer changes. The invention can improve the clustering accuracy of the existing k-means algorithm based on the negative database, and the proposed Euclidean distance estimation method can also be used in other data mining algorithms to protect data privacy.

Description

technical field [0001] The invention belongs to the field of privacy protection and security, and in particular relates to a privacy-protected k-means clustering method formed by using a negative database to protect data privacy of a k-means algorithm. Background technique [0002] With the rapid development of computer technology, a large amount of data is produced, which also makes the data mining technology develop rapidly. Many data mining algorithms have been proposed, such as k-means algorithm, k-nearest neighbor algorithm and so on. These data mining algorithms do not protect data security during operation, which may cause users' private information to be leaked. As people pay more and more attention to private information, data mining for privacy protection becomes particularly important. [0003] The negative database (negative database, NDB) is inspired by the artificial immune system. Unlike the traditional database, the negative database stores information that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62
CPCG06F18/23213
Inventor 赵冬冬胡小意向剑文
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products