{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T09:06:51Z","timestamp":1773133611209,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319594620","type":"print"},{"value":"9783319594637","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_37","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"367-377","source":"Crossref","is-referenced-by-count":7,"title":["DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark"],"prefix":"10.1007","author":[{"given":"Zhi-Qiang","family":"Gao","sequence":"first","affiliation":[]},{"given":"Long-Jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1504\/IJSSC.2015.070945","volume":"5","author":"D Chasaki","year":"2015","unstructured":"Chasaki, D., Mansour, C.: Security challenges in the internet of things. Int. J. Space-Based Situated Comput. 5, 141\u2013149 (2015)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"37_CR2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4018\/IJTHI.2016010102","volume":"12","author":"A Beldad","year":"2016","unstructured":"Beldad, A.: Sealing one\u2019s online wall off from outsiders: determinants of the use of facebook\u2019s privacy settings among young dutch users. Int. J. Technol. Hum. Interact. (IJTHI) 12, 21\u201334 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"key":"37_CR3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1504\/IJGUC.2012.047768","volume":"3","author":"M Barhamgi","year":"2012","unstructured":"Barhamgi, M., Benslimane, D., Ghedira, C.: PPPDM\u2013a privacy-preserving platform for data mashup. Int. J. Grid Utility Comput. 3, 175\u2013187 (2012)","journal-title":"Int. J. Grid Utility Comput."},{"key":"37_CR4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.4018\/IJTHI.2016040103","volume":"12","author":"X Li","year":"2016","unstructured":"Li, X., He, Y., Niu, B.: An exact and efficient privacy-preserving spatiotemporal matching in mobile social networks. Int. J. Technol. Hum. Interact. (IJTHI) 12, 36\u201347 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"key":"37_CR5","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1504\/IJGUC.2013.057120","volume":"4","author":"R Petrlic","year":"2013","unstructured":"Petrlic, R., Sekula, S., Sorge, C.: A privacy-friendly architecture for future cloud computing. Int. J. Grid Utility Comput. 4, 265\u2013277 (2013)","journal-title":"Int. J. Grid Utility Comput."},{"key":"37_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1002\/sam.10029","volume":"2","author":"Y Duan","year":"2009","unstructured":"Duan, Y., Canny, J.: How to deal with malicious users in privacy-preserving distributed data mining. Stat. Anal. Data Mining 2, 18\u201333 (2009)","journal-title":"Stat. Anal. Data Mining"},{"key":"37_CR7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.4018\/IJITWE.2016070104","volume":"11","author":"N Khan","year":"2016","unstructured":"Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 50\u201364 (2016)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"37_CR8","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1504\/IJGUC.2016.073778","volume":"7","author":"W Zhang","year":"2016","unstructured":"Zhang, W., Jiang, S., Zhu, X.: Cooperative downloading with privacy preservation and access control for value-added services in VANETs. Int. J. Grid Utility Comput. 7, 50\u201360 (2016)","journal-title":"Int. J. Grid Utility Comput."},{"key":"37_CR9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4018\/IJITWE.2016070105","volume":"11","author":"M Almiani","year":"2016","unstructured":"Almiani, M., Razaque, A., Al, D.A.: Privacy preserving framework to support mobile government services. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 65\u201378 (2016)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"37_CR10","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1142\/S0219622006002258","volume":"5","author":"Q Yang","year":"2006","unstructured":"Yang, Q., Wu, X.: 10 challenging problems in data mining research. Int. J. Inf. Technol. Decis. Making 5, 597\u2013604 (2006)","journal-title":"Int. J. Inf. Technol. Decis. Making"},{"key":"37_CR11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28, 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Su, D., Cao, J., Li, N.: Differentially private k-means clustering. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 26\u201337 (2016)","DOI":"10.1145\/2857705.2857708"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Samet, S., Miri, A., Orozco-Barbosa, L.: Privacy preserving k-means clustering in multi-party environment. In: SECRYPT, pp. 381\u2013385 (2007)","DOI":"10.5220\/0002121703810385"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Doganay, M.C., Pedersen, T.B., Saygin, Y.: Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, pp. 3\u201311 (2008)","DOI":"10.1145\/1379287.1379291"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K.: Efficient privacy preserving k-means clustering. In: Pacific-Asia Workshop on Intelligence and Security Informatics, pp. 154\u2013166. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13601-6_17"},{"key":"37_CR16","doi-asserted-by":"crossref","first-page":"82","DOI":"10.4018\/IJITWE.2015070106","volume":"10","author":"H Chen","year":"2015","unstructured":"Chen, H., Hu, Y., Lian, Z.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web Eng. (IJITWE) 10, 82\u2013102 (2015)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"37_CR17","unstructured":"Hadoop. http:\/\/hadoop.apache.org"},{"key":"37_CR18","unstructured":"Mllib. http:\/\/spark.apache.org\/mllib"},{"key":"37_CR19","unstructured":"Spark. http:\/\/spark.apache.org"},{"key":"37_CR20","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54, 86\u201395 (2011)","journal-title":"Commun. ACM"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Kennedy, J.: Particle swarm optimization. In: Encyclopedia of Machine Learning, pp. 760\u2013766. Springer, Heidelberg (2011)","DOI":"10.1007\/978-0-387-30164-8_630"},{"key":"37_CR22","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1504\/IJMMNO.2010.035430","volume":"1","author":"XS Yang","year":"2010","unstructured":"Yang, X.S., Deb, S.: Engineering optimisation by cuckoo search. Int. J. Math. Model. Numer. Optimisation 1, 330\u2013343 (2010)","journal-title":"Int. J. Math. Model. Numer. Optimisation"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W.: Security and privacy in cloud computing: a survey. In: 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), pp. 105\u2013112 (2010)","DOI":"10.1109\/SKG.2010.19"},{"key":"37_CR24","unstructured":"Roy, I., Setty, S.T., Kilzer, A.: Airavat: security and privacy for mapreduce. In: NSDI, pp. 297\u2013312 (2010)"},{"issue":"7","key":"37_CR25","doi-asserted-by":"crossref","first-page":"622","DOI":"10.14778\/2180912.2180915","volume":"5","author":"B Bahmani","year":"2013","unstructured":"Bahmani, B., Moseley, B., Vattani, A., et al.: Scalable k-means++. Proc. VLDB Endow. 5(7), 622\u2013633 (2013)","journal-title":"Proc. VLDB Endow."},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Ahmadyfard, A., Modares, H.: Combining PSO and k-means to enhance data clustering. In: International Symposium on Telecommunications, IST 2008, pp. 688\u2013691 (2008)","DOI":"10.1109\/ISTEL.2008.4651388"},{"key":"37_CR27","doi-asserted-by":"crossref","first-page":"5099","DOI":"10.1016\/j.ijleo.2016.02.061","volume":"127","author":"W Kong","year":"2016","unstructured":"Kong, W., Lei, Y., Ma, J.: Virtual machine resource scheduling algorithm for cloud computing based on auction mechanism. Optik-Int. J. Light Electron Optics. 127, 5099\u20135104 (2016)","journal-title":"Optik-Int. J. Light Electron Optics."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:36:07Z","timestamp":1750278967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_37","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}