Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/37787
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor吳家麟
dc.contributor.authorPing-Yen Hsiehen
dc.contributor.author謝秉諺zh_TW
dc.date.accessioned2021-06-13T15:43:48Z-
dc.date.available2008-07-09
dc.date.copyright2008-07-09
dc.date.issued2008
dc.date.submitted2008-07-03
dc.identifier.citation[1] AK. Jain, MN Murty, PJ. Flynn, “Data Clustering: A Review,” in ACM Computing Surveys (CSUR), 1999
[2] RO. Duda, PE. Hart, “Pattern Classification and Scene Analysis,” Wiley Interscience, 1973
[3] S. Guha, A. Meyerson, N. Mishra, R. Motwani, L. O’Callaghan, “Clustering Data Streams: Theory and Practice,” in IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 3, May/June 2003
[4] G. Adomavicius, A. Tuzhilin, “Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions,” in IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 6, June 2005
[5] S. Jha, L. Kruger, P. McDaniel, “Privacy Preserving Clustering,” in 10th European Symposium on Research in Computer Security (ESORICS), 2005
[6] R. Agrawal, R. Srikant, “Privacy-Preserving Data Mining,” in ACM SIGMOD Record, vol. 29, issue 2, June 2000
[7] M. Kantarcioglu, C. Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data,” in IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, Sep. 2004
[8] J. Vaidya, C. Clifton, “Privacy-Preserving K-Means Clustering over Vertically Partitioned Data,” in SIGKDD Knowledge Discovery and Data Mining, 2003
[9] DK. Tasoulis, EC. Laskari, GK. Meletiou, MN. Vrahatis, “Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data,” in Computational Science and Its Applications (ICCSA), 2006
[10] A. Inan, Y. Saygin, E. Savas, AA. Hintoglu, A. Levi, “Privacy Preserving Clustering on Horizontally Partitioned Data,” in Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
[11] G. Jagannathan, K. Pillaipakkamnatt, RN. Wright, “A New Privacy-Preserving Distributed k-Clustering Algorithm,” in Proceedings of the 2006 SIAM International Conference on Data Mining, 2006
[12] G. Jagannathan, RN. Wright, “Privacy-Preserving Distributed K-Means Clustering over Arbitrarily Partitioned Data,” in SIGKDD Knowledge Discovery and Data Mining, 2005
[13] BCM. Fung, K. Wang, PS. Yu, “Anonymizing Classification Data for Privacy Preservation,” in IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 5, May 2007
[14] SRM. Oliveira, OR. Zaiane, “Privacy-Preserving Clustering by Object Similarity-Based Representation and Dimensionality Reduction Transformation,”
in Proceedings of the Workshop on Privacy and Security Aspects of Data Mining in conjunction with the Fourth IEEE International Conference on Data Mining, 2004
[15] S. Merugu, J. Ghosh, “Privacy-Preserving Distributed Clustering using Generative Models,” in Proceedings of the Third IEEE International Conference on Data Mining, 2003
[16] R. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” in Communications of the ACM, vol. 21, 1978
[17] P. Paillier, “Public Key Cryptosystems Based on Composite Degree Residuosity Classes,” in Eurocrypt, 1999
[18] J. Benaloh, “Dense Probabilistic Encryption,” in Proceedings of the Workshop on Selected Areas of Cryptography, 1994
[19] D. Naccache, J. Stern, “A New Public Key Cryptosystem Based on Higher Residues,” in Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998
[20] T. Okamoto, S. Uchiyama, “A New Public-Key Cryptosystem as Secure as Factoring,” in Advances in Cryptography, Eurocrypt, 1998
[21] G. Nagy, “State of the Art in Pattern Recognition,” in Proceedings of IEEE 56, 1968
[22] SC. Johnson, “Hierarchical Clustering Schemes,” Psychometrika, 2: 241-254, 1967
[23] W. Du, M. Atallah, “Privacy-Preserving Cooperative Statistical Analysis,” in 17th ACSAC, pp. 102-112, 2001
[24] B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen, “On Private Scalar Product Computation for Privacy-Preserving Data Mining,” in Proceedings of the 7th International Conference on Information Security and Cryptology (ICISC), 2004
[25] AC. Yao, “Protocols for Secure Computations,” in Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982
[26] I. Ioannidis, A. Grama, “An Efficient Protocol for Yao's Millionaires' Problem,” in Proceedings of the 36th Hawaii International Conference on System Sciences, 2002
[27] LIBSVM Data: Classification, Regression, and Multi-label: http://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/37787-
dc.description.abstractClustering is one of the most useful techniques to do some data analysis. But the conventional way to perform clustering usually offends one’s privacy. In the era of digital information, privacy is a very important concern in our daily life. To preserve one’s privacy, we exploit several privacy-preserving clustering schemes in this thesis. In the beginning, introduction to clustering, distributed clustering, and privacy-preserving clustering schemes will be given in order. And then, two major schemes, privacy-preserving k-means clustering and privacy-preserving hierarchical clustering, are illustrated in details. We implement these algorithms and perform experiments with both simulated ones and realistic data sets to learn the characteristics of each privacy-preserving clustering algorithm and evaluate the feasibility and usefulness of privacy-preserving clustering schemes.en
dc.description.provenanceMade available in DSpace on 2021-06-13T15:43:48Z (GMT). No. of bitstreams: 1
ntu-97-R95944004-1.pdf: 988723 bytes, checksum: 404e3b5da52c6dcb6ff3fe9a98f1cae1 (MD5)
Previous issue date: 2008
en
dc.description.tableofcontentsChapter 1 Introduction 1
Chapter 2 Related Work 5
Chapter 3 Distributed Clustering 9
3.1 Distributed K-Means Clustering 10
3.1.1 K-Means Clustering 10
3.1.2 Distributed K-Means Clustering 12
3.2 Distributed Hierarchical Clustering 16
3.2.1 Hierarchical Clustering 16
3.2.2 Modified Hierarchical Clustering 18
3.2.3 Distributed Hierarchical Clustering 20
Chapter 4 Privacy-Preserving Clustering 23
4.1 Preliminaries 23
4.1.1 Paillier Cryptosystem 23
4.1.2 Secure Weighted Average Protocol 26
4.1.3 Permute Share 28
4.1.4 Secure Scalar Product 29
4.1.5 Yao’s Millionaires’ Protocol 31
4.2 Privacy-Preserving K-Means Clustering 33
4.3 Privacy-Preserving Hierarchical Clustering 35
4.3.1 Share Centers and Weights 36
4.3.2 Construct the Proximity Matrix 38
4.3.3 Find the Nearest Pair 41
4.3.4 Merge the Nearest Pair 43
Chapter 5 System Implementation 47
5.1 Interface 47
5.2 Implementation Detail 50
5.3 Experiment Results 51
5.3.1 Characteristics of Clustering Algorithms 51
5.3.2 Distributed Clustering Algorithm Comparisons 55
5.3.3 Privacy-Preserving Clustering Algorithm Comparisons 59
Chapter 6 Conclusions and Future Work 63
Reference 65
dc.language.isoen
dc.subject隱私保護群聚zh_TW
dc.subject分散式群聚zh_TW
dc.subject群聚zh_TW
dc.subjectPrivacy-Preserving Clusteringen
dc.subjectClusteringen
dc.subjectDistributed Clusteringen
dc.title以隱私保護為目的之群聚方式研究zh_TW
dc.titleA Study of Some Privacy-Preserving Clustering Schemesen
dc.typeThesis
dc.date.schoolyear96-2
dc.description.degree碩士
dc.contributor.oralexamcommittee莊玉如,林育慈,朱威達
dc.subject.keyword群聚,分散式群聚,隱私保護群聚,zh_TW
dc.subject.keywordClustering,Distributed Clustering,Privacy-Preserving Clustering,en
dc.relation.page68
dc.rights.note有償授權
dc.date.accepted2008-07-03
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
ntu-97-1.pdf
  未授權公開取用
965.55 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved