Ke Li , Xinrong Sun , Yunting Tao , Fanyu Kong , Guoqiang Yang , Chunpeng Ge , Qiuliang Xu
{"title":"Efficient privacy-preserving outsourcing of imbalanced clustering in cloud computing","authors":"Ke Li , Xinrong Sun , Yunting Tao , Fanyu Kong , Guoqiang Yang , Chunpeng Ge , Qiuliang Xu","doi":"10.1016/j.jisa.2025.104155","DOIUrl":null,"url":null,"abstract":"<div><div>Imbalanced clustering algorithm plays a vital role in fields, such as fault detection in finance, network security and medical diagnosis. The Imbalanced Clustering with Theoretical Learning Bounds (ICTLB) algorithm is a novel imbalanced clustering algorithm but could incur high computational costs due to extensive matrix operations, making it less practical for resource-limited devices. Outsourcing computations to cloud servers can alleviate client burdens but need to solve data privacy issues and result verification problem. In this paper, we propose an efficient, secure, and verifiable outsourcing scheme for the ICTLB imbalanced clustering algorithm. We design a novel encryption method based on sparse matrices and random permutations, which effectively protects the privacy of the input data while ensuring minimal computational overhead on the client side. Our scheme also integrates a robust verification mechanism, allowing the client to validate the correctness of results returned by the cloud server. Experiments show that the proposed scheme can improve efficiency by 28.88% to 52.48% comparable to the original ICTLB algorithm across various datasets.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104155"},"PeriodicalIF":3.8000,"publicationDate":"2025-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001929","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Imbalanced clustering algorithm plays a vital role in fields, such as fault detection in finance, network security and medical diagnosis. The Imbalanced Clustering with Theoretical Learning Bounds (ICTLB) algorithm is a novel imbalanced clustering algorithm but could incur high computational costs due to extensive matrix operations, making it less practical for resource-limited devices. Outsourcing computations to cloud servers can alleviate client burdens but need to solve data privacy issues and result verification problem. In this paper, we propose an efficient, secure, and verifiable outsourcing scheme for the ICTLB imbalanced clustering algorithm. We design a novel encryption method based on sparse matrices and random permutations, which effectively protects the privacy of the input data while ensuring minimal computational overhead on the client side. Our scheme also integrates a robust verification mechanism, allowing the client to validate the correctness of results returned by the cloud server. Experiments show that the proposed scheme can improve efficiency by 28.88% to 52.48% comparable to the original ICTLB algorithm across various datasets.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.