{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:08:37Z","timestamp":1751602117255,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_4","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T10:03:21Z","timestamp":1523354601000},"page":"67-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework"],"prefix":"10.1007","author":[{"given":"Hong","family":"Rong","sequence":"first","affiliation":[]},{"given":"Huimei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jialu","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"issue":"4","key":"4_CR1","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1851275.1851212","volume":"40","author":"Mohammad Hajjat","year":"2010","unstructured":"Hajjat, M., Sun, X., Sung, Y.E., Maltz, D., Rao, S., Spripanidkulchai, K., Tawarmalani, M.: Cloudward bound: planning for beneficial migration of enterprise applications to the cloud. In: ACM SIGCOMM, pp. 243\u2013254 (2010)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"4_CR2","unstructured":"Amazon Machine Learning. https:\/\/aws.amazon.com\/machine-learning\/"},{"key":"4_CR3","unstructured":"Cloud Machine Learning Engine. https:\/\/cloud.google.com\/ml-engine\/"},{"key":"4_CR4","unstructured":"Do your best work with Watson. https:\/\/www.ibm.com\/watson\/"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1038\/nature02541","volume":"429","author":"S Eubank","year":"2004","unstructured":"Eubank, S., Guclu, H., Kumar, V.S.A., Marathe, M.V., Srinivasan, A., Toroczkai, Z., Wang, N.: Modeling disease outbreaks in realistic urban social networks. Nature 429, 180\u2013184 (2004)","journal-title":"Nature"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. 31, 264\u2013323 (1999)","journal-title":"ACM Comput. Surv."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over arbitrarily partitioned data. In: ACM KDD (2003)","DOI":"10.1145\/956755.956776"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Gehrke, J., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: KDD, pp. 593\u2013599 (2005)","DOI":"10.1145\/1081870.1081942"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Lin, K.: Privacy-preserving kernel k-means outsourcing with randomized kernels. In: ICDM Workshop, pp. 860\u2013866 (2013)","DOI":"10.1109\/ICDMW.2013.29"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: ASIA CCS, pp. 123\u2013133 (2014)","DOI":"10.1145\/2590296.2590332"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Rao, F., Samanthula, B.K., Bertino, E., Yi, X., Liu, D.: Privacy-preserving and outsourced multi-user k-means clustering. In: IEEE Conference on Collaboration and Internet Computing, pp. 80\u201389 (2015)","DOI":"10.1109\/CIC.2015.20"},{"issue":"9","key":"4_CR12","first-page":"2655","volume":"9","author":"Y Huang","year":"2014","unstructured":"Huang, Y., Lu, Q., Xiong, Y.: Collaborative outsourced data mining for secure cloud computing. J. Netw. 9(9), 2655\u20132664 (2014)","journal-title":"J. Netw."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted database. In: SIGMOD, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11693383_10","volume-title":"Selected Areas in Cryptography","author":"T-Y Youn","year":"2006","unstructured":"Youn, T.-Y., Park, Y.-H., Kim, C.H., Lim, J.: An efficient public key cryptosystem with a privacy enhanced double decryption mechanism. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 144\u2013158. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11693383_10"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-40061-5_3","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"E Bresson","year":"2003","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37\u201354. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_3"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-40974-8_13","volume-title":"Cryptography and Coding","author":"E Kiltz","year":"2003","unstructured":"Kiltz, E., Malone-Lee, J.: A general construction of IND-CCA2 secure public key encryption. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 152\u2013166. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40974-8_13"},{"issue":"2008","key":"4_CR17","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.ipl.2008.05.017","volume":"108","author":"D Galindo","year":"2008","unstructured":"Galindo, D., Herranz, J.: On the security of public key cryptosystems with a double decryption mechanism. Inf. Process. Lett. 108(2008), 279\u2013283 (2008)","journal-title":"Inf. Process. Lett."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Liu, X., Jiang, Z.L., Yiu, S.M., et al.: Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks. In: The 11th International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 124\u2013133 (2016)","DOI":"10.1109\/MSN.2015.42"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"L\u00f3pez, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: STOC, pp. 1219\u20131234 (2012)","DOI":"10.1145\/2213977.2214086"},{"issue":"12","key":"4_CR20","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2013.2288131","volume":"8","author":"A Peter","year":"2013","unstructured":"Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046\u20132058 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"4_CR21","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.procs.2015.07.286","volume":"53","author":"JR Ortiz","year":"2015","unstructured":"Ortiz, J.R., Oneto, L., Anguita, D.: Big data analytics in the cloud: spark on hadoop vs MPI\/OpenMP on Beowulf. Procedia Comput. Sci. 53(1), 121\u2013130 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"4_CR22","first-page":"1235","volume":"17","author":"X Meng","year":"2015","unstructured":"Meng, X., Bradley, J., Yavuz, B., Sparks, E., Venkataraman, S.: MLlib: machine learing in apache spark. J. Mach. Learn. Res. 17(1), 1235\u20131241 (2015)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR23","unstructured":"Goldreich, O.: The Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)"},{"key":"4_CR24","unstructured":"Peralta, R.: Report on Integer Factorization (2001). http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/fy15\/doc\/1025_report.pdf"},{"key":"4_CR25","unstructured":"Naeem, M., Asghar, S.: KEGG Metabolic Reaction Network Data Set. The UCI KDD Archive (2011). https:\/\/archives.ics.uci.edu\/ml\/datasets\/KEGG+Metabolic+Reaction+Network+(Undirected)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T15:10:17Z","timestamp":1751555417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}