Privacy-preserving user clustering in a social network

Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

34 Citations (Scopus)

Abstract

In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar interests. The data needed to construct such networks may be considered sensitive personal information by the users, which raises privacy concerns. The problem of building social networks while user privacy is protected is hence crucial for further development of such networks. K-means clustering is widely used for clustering users in a social network. In this paper, we provide an efficient privacy-preserving variant of K-means clustering. The scenario we consider involves a server and multiple users where users need to be grouped into K clusters. In our protocol the server is not allowed to learn the individual user data and users are not allowed to learn the cluster centers. The experiments on the MovieLens dataset show that deployment of the system for real use is reasonable as its efficiency even on conventional hardware is promising.
Original languageEnglish
Title of host publication2009 First IEEE International Workshop on Information Forensics and Security (WIFS)
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages96-100
Number of pages5
ISBN (Electronic)978-1-4244-5280-4
ISBN (Print)978-1-4244-5279-8
DOIs
Publication statusPublished - 9 Dec 2009
Externally publishedYes
EventFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009 - London, United Kingdom
Duration: 6 Dec 20099 Dec 2009

Publication series

NameIEEE International Workshop on Information Forensics and Security (WIFS)
PublisherIEEE
Number1
Volume2009
ISSN (Print)2157-4766
ISSN (Electronic)2157-4774

Conference

ConferenceFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
Abbreviated titleWIFS 2009
Country/TerritoryUnited Kingdom
CityLondon
Period6/12/099/12/09

Keywords

  • Cryptography
  • Servers
  • Protocols
  • Clustering algorithms
  • Social network services
  • Data privacy
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Privacy-preserving user clustering in a social network'. Together they form a unique fingerprint.

Cite this