2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference On 2019
DOI: 10.1109/hpcc/smartcity/dss.2019.00093
|View full text |Cite
|
Sign up to set email alerts
|

ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud

Abstract: we present an approach named ClustCrypt for efficient topic-based clustering of encrypted unstructured big data in the cloud. ClustCrypt dynamically estimates the optimal number of clusters based on the statistical characteristics of encrypted data. It also provides clustering approach for encrypted data. We deploy ClustCrypt within the context of a secure cloud-based semantic search system (S3BD). Experimental results obtained from evaluating ClustCrypt on three datasets demonstrate on average 60% improvement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…Zobaed et al 19 introduced a novel Clust Crypt technique for efficient topic‐based clustering approach of encrypted unstructured big data in the cloud environment. This work is also based on clustering technique for encrypted data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Zobaed et al 19 introduced a novel Clust Crypt technique for efficient topic‐based clustering approach of encrypted unstructured big data in the cloud environment. This work is also based on clustering technique for encrypted data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cloud-based enterprise search services, such as AWS Kendra, offer semantic searchability, given that they are provided with the plain-text data. That means the semantic ability comes with the cost of compromising the users' data privacy [10], [14], [5]. This is, in fact, the trapdoor that particularly internal attackers can misuse to breach the confidentiality or even the integrity of the users' data.…”
Section: A Cloud-based Enterprise Search Servicesmentioning
confidence: 99%
“…Although the cloud services have been fascinating for big data owners [3], there have been numerous privacy violation incidents [4] during recent years that have made individuals and businesses with sensitive data (e.g., healthcare documents) hesitant to fully embrace the data management cloud services. In one incident, confidential information of over three billion Yahoo users were exposed [5]. In another incident, information of over 14 million Verizon customer accounts were exposed from the company's cloud system [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, with big datasets, the index size can become extensively large [13] and the real-timeness of the system is affected. To make searchable encryption systems scalable, solutions are provided to partition the encrypted keywords of the index structure into several clusters based on the topical relatedness of keywords [7] [14]. Then, for a given search query, a pruning method is used to limit the search space only to clusters relevant to the query [5].…”
Section: Introductionmentioning
confidence: 99%