{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:52:25Z","timestamp":1774021945786,"version":"3.50.1"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>With the advent of big data era, clients who lack computational and storage resources tend to outsource data mining tasks to cloud service providers in order to improve efficiency and reduce costs. It is also increasingly common for clients to perform collaborative mining to maximize profits. However, due to the rise of privacy leakage issues, the data contributed by clients should be encrypted using their own keys. This paper focuses on privacy-preserving <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>-means clustering over the joint datasets encrypted under multiple keys. Unfortunately, existing outsourcing <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>-means protocols are impractical because not only are they restricted to a single key setting, but also they are inefficient and nonscalable for distributed cloud computing. To address these issues, we propose a set of privacy-preserving building blocks and outsourced <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M4\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>-means clustering protocol under Spark framework. Theoretical analysis shows that our scheme protects the confidentiality of the joint database and mining results, as well as access patterns under the standard semihonest model with relatively small computational overhead. Experimental evaluations on real datasets also demonstrate its efficiency improvements compared with existing approaches.<\/jats:p>","DOI":"10.1155\/2017\/3910126","type":"journal-article","created":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T18:31:30Z","timestamp":1510597890000},"page":"1-19","source":"Crossref","is-referenced-by-count":14,"title":["Privacy-Preserving <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>-Means Clustering under Multiowner Setting in Distributed Cloud Environments"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5631-8128","authenticated-orcid":true,"given":"Hong","family":"Rong","sequence":"first","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha, China"}]},{"given":"Huimei","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha, China"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha, China"}]},{"given":"Jialu","family":"Hao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha, China"}]},{"given":"Ming","family":"Xian","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha, China"}]}],"member":"311","reference":[{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.1"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_23"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0923-2"},{"key":"13","first-page":"274","volume-title":"k-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction","year":"2017"},{"issue":"99","key":"14","first-page":"1","volume":"pp","year":"2017","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"9","key":"16","first-page":"2655","volume":"9","year":"2014","journal-title":"Journal of Networks"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_30"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_71"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2288131"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_10"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40974-8_13"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.05.017"},{"key":"37","first-page":"1","year":"2010","journal-title":"HotSec'10"},{"key":"36","year":"2009","journal-title":"NDSS"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573770"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2364027"},{"issue":"1","key":"42","first-page":"121","volume":"53","journal-title":"Procedia Computer Science"},{"issue":"1","key":"43","first-page":"1235","volume":"17","year":"2015","journal-title":"Journal of Machine Learning Research"},{"key":"49","year":"2011"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511546891"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3910126.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3910126.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3910126.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T18:31:32Z","timestamp":1510597892000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/3910126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":25,"alternative-id":["3910126","3910126"],"URL":"https:\/\/doi.org\/10.1155\/2017\/3910126","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}