User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data

User behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the inc...

Full description

Bibliographic Details
Main Authors: Minghui Gao, Bo Li, Chen Wang, Li Ma, Jian Xu
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8913457/
_version_ 1818936351877234688
author Minghui Gao
Bo Li
Chen Wang
Li Ma
Jian Xu
author_facet Minghui Gao
Bo Li
Chen Wang
Li Ma
Jian Xu
author_sort Minghui Gao
collection DOAJ
description User behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the increasing awareness of privacy protection, user behavior analysis also needs to support for ciphertext to protect user data. Based on clustering algorithm, homomorphic encryption technology and information security, in this paper, we propose a user behavior clustering scheme that supports automatic tags on ciphertext. Firstly, design a security protocol corresponding to the basic operations such as addition, multiplication and comparison and apply to the scheme. Then, the relevant features of the user behavior are merged with the clustering process, the latent factor model, and matrix decomposition. We have implemented our method and evaluated its performance using K-means and K-means++ clustering. The results show that the scheme can auto tags over encrypted data, and the tag also meets the actual situation, which proves the validity and generality of the scheme.
first_indexed 2024-12-20T05:34:41Z
format Article
id doaj.art-73dbcd81380f4f04a5a89c06b7a4646e
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T05:34:41Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-73dbcd81380f4f04a5a89c06b7a4646e2022-12-21T19:51:39ZengIEEEIEEE Access2169-35362019-01-01717064817065710.1109/ACCESS.2019.29560198913457User Behavior Clustering Scheme With Automatic Tagging Over Encrypted DataMinghui Gao0https://orcid.org/0000-0002-2913-3048Bo Li1https://orcid.org/0000-0001-5373-4196Chen Wang2https://orcid.org/0000-0001-9460-3221Li Ma3https://orcid.org/0000-0002-4338-2200Jian Xu4https://orcid.org/0000-0001-5590-8540China NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing, ChinaChina NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing, ChinaSoftware College, Northeastern University, Shenyang, ChinaChina NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing, ChinaSoftware College, Northeastern University, Shenyang, ChinaUser behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the increasing awareness of privacy protection, user behavior analysis also needs to support for ciphertext to protect user data. Based on clustering algorithm, homomorphic encryption technology and information security, in this paper, we propose a user behavior clustering scheme that supports automatic tags on ciphertext. Firstly, design a security protocol corresponding to the basic operations such as addition, multiplication and comparison and apply to the scheme. Then, the relevant features of the user behavior are merged with the clustering process, the latent factor model, and matrix decomposition. We have implemented our method and evaluated its performance using K-means and K-means++ clustering. The results show that the scheme can auto tags over encrypted data, and the tag also meets the actual situation, which proves the validity and generality of the scheme.https://ieeexplore.ieee.org/document/8913457/User behavior clusteringencrypted dataclustering with tagging
spellingShingle Minghui Gao
Bo Li
Chen Wang
Li Ma
Jian Xu
User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
IEEE Access
User behavior clustering
encrypted data
clustering with tagging
title User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
title_full User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
title_fullStr User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
title_full_unstemmed User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
title_short User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
title_sort user behavior clustering scheme with automatic tagging over encrypted data
topic User behavior clustering
encrypted data
clustering with tagging
url https://ieeexplore.ieee.org/document/8913457/
work_keys_str_mv AT minghuigao userbehaviorclusteringschemewithautomatictaggingoverencrypteddata
AT boli userbehaviorclusteringschemewithautomatictaggingoverencrypteddata
AT chenwang userbehaviorclusteringschemewithautomatictaggingoverencrypteddata
AT lima userbehaviorclusteringschemewithautomatictaggingoverencrypteddata
AT jianxu userbehaviorclusteringschemewithautomatictaggingoverencrypteddata