Proceedings of the 2013 SIAM International Conference on Data Mining 2013
DOI: 10.1137/1.9781611972832.70
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers

Abstract: The Cloud-based infrastructure-as-a-service (IaaS) paradigm (e.g., Amazon EC2) enables a client who lacks computational resources to outsource her dataset and data mining tasks to the Cloud. However, as the Cloud may not be fully trusted, it raises serious concerns about the integrity of the mining results returned by the Cloud. To this end, in this paper, we provide a focused study about how to perform integrity verification of the k-means clustering task outsourced to an IaaS provider. We consider the untrus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…Unfortunately, this body of theory is impractical [19], and thus it is difficult to adopt these general-purpose cryptographic verification techniques to data mining problems for practical verification. Recently several result integrity verification methods have been designed for specific data mining problems, including frequent itemset mining [20,7,8], outlier mining [17], clustering [15]. Among these work, only [20,7,8] focus on integrity verification methods for frequent itemset mining.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, this body of theory is impractical [19], and thus it is difficult to adopt these general-purpose cryptographic verification techniques to data mining problems for practical verification. Recently several result integrity verification methods have been designed for specific data mining problems, including frequent itemset mining [20,7,8], outlier mining [17], clustering [15]. Among these work, only [20,7,8] focus on integrity verification methods for frequent itemset mining.…”
Section: Related Workmentioning
confidence: 99%
“…Only a few work [18,11,12] have studied the issue of integrity verification of data mining computations outsourced to third-party DM aS providers. [18] studies the problem of verifying the correctness and completeness of outsourced association rule mining.…”
Section: Related Workmentioning
confidence: 99%
“…Its basic idea is to insert artificial items into the dataset; the mining result can be verified via the artificial (in)frequent itemsets constructed from artificial items. [11] and [12] apply the same strategy of using artificial data mining objects to the problems of verifying outlier mining and k-means clustering respectively. These work show that the design of artificial mining objects vary dramatically for different data mining problems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides [9] and [10], there are many other related works. For example, Wong et al [11] and Dong et al [4] investigated the integrity issues in outsourcing frequent itemset mining computations, and Liu et al [6] proposed probabilistic and deterministic methods to verify clustering results for k-means clustering algorithms.…”
Section: Introductionmentioning
confidence: 99%