Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (2): 196-210.doi: 10.19665/j.issn1001-2400.20230305

• Computer Science and Technology & Cyberspace Security • Previous Articles     Next Articles

Secure K-prototype clustering against the collusion of rational adversaries

TIAN Youliang1,2,3,4(), ZHAO Min1,2,3,4(), BI Renwan5(), XIONG Jinbo1,2,5()   

  1. 1. State Key Laboratory of Public Big Date,Guizhou University,Guiyang 550025,China
    2. College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
    3. Institute of Cryptography & Data Security,Guizhou University,Guiyang 550025,China
    4. Guizhou Provincial Key Laboratory of Cryptography & Blockchain Technology,Guiyang 550025,China
    5. College of Computer and Cyber Security,Fujian Normal University,Fuzhou 350117,China
  • Received:2022-10-31 Online:2024-04-20 Published:2023-10-07
  • Contact: XIONG Jinbo E-mail:youliangtian@163.com;2233174061@qq.com;brw2806@163.com;jbxiong@fjnu.edu.cn

Abstract:

Aiming at the problem of data privacy leakage in cloud environment and collusion between cloud servers in the process of clustering,an cooperative secure K-prototype clustering scheme(CSKC) against the adversaries of rational collusion is proposed.First,considering that homomorphic encryption does not directly support nonlinear computing,secure computing protocols are designed based on homomorphic encryption and additive secret sharing to ensure that the input data and intermediate results are in the form of additive secret share,and to achieve accurate calculation of the security comparison function.Second,according to the game equilibrium theory,a variety of efficient incentive mechanisms are designed,and the mutual condition contract and report contract are constructed to constrain cloud servers to implement secure computing protocols honestly and non-collusively.Finally,the proposed protocols and contracts are analyzed theoretically,and the performance of the CSKC scheme is verified by experiment.Experimental results show that compared with the model accuracy in plaintext environment,the model accuracy loss of the CSKC scheme is controlled within 0.22%.

Key words: additive secret sharing, homomorphic encryption, secure computing protocol, collusion-resistance, cooperative securely

CLC Number: 

  • TP309.7

Baidu
map