User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
User behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the inc...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8913457/ |
_version_ | 1818936351877234688 |
---|---|
author | Minghui Gao Bo Li Chen Wang Li Ma Jian Xu |
author_facet | Minghui Gao Bo Li Chen Wang Li Ma Jian Xu |
author_sort | Minghui Gao |
collection | DOAJ |
description | User behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the increasing awareness of privacy protection, user behavior analysis also needs to support for ciphertext to protect user data. Based on clustering algorithm, homomorphic encryption technology and information security, in this paper, we propose a user behavior clustering scheme that supports automatic tags on ciphertext. Firstly, design a security protocol corresponding to the basic operations such as addition, multiplication and comparison and apply to the scheme. Then, the relevant features of the user behavior are merged with the clustering process, the latent factor model, and matrix decomposition. We have implemented our method and evaluated its performance using K-means and K-means++ clustering. The results show that the scheme can auto tags over encrypted data, and the tag also meets the actual situation, which proves the validity and generality of the scheme. |
first_indexed | 2024-12-20T05:34:41Z |
format | Article |
id | doaj.art-73dbcd81380f4f04a5a89c06b7a4646e |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T05:34:41Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-73dbcd81380f4f04a5a89c06b7a4646e2022-12-21T19:51:39ZengIEEEIEEE Access2169-35362019-01-01717064817065710.1109/ACCESS.2019.29560198913457User Behavior Clustering Scheme With Automatic Tagging Over Encrypted DataMinghui Gao0https://orcid.org/0000-0002-2913-3048Bo Li1https://orcid.org/0000-0001-5373-4196Chen Wang2https://orcid.org/0000-0001-9460-3221Li Ma3https://orcid.org/0000-0002-4338-2200Jian Xu4https://orcid.org/0000-0001-5590-8540China NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing, ChinaChina NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing, ChinaSoftware College, Northeastern University, Shenyang, ChinaChina NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing, ChinaSoftware College, Northeastern University, Shenyang, ChinaUser behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the increasing awareness of privacy protection, user behavior analysis also needs to support for ciphertext to protect user data. Based on clustering algorithm, homomorphic encryption technology and information security, in this paper, we propose a user behavior clustering scheme that supports automatic tags on ciphertext. Firstly, design a security protocol corresponding to the basic operations such as addition, multiplication and comparison and apply to the scheme. Then, the relevant features of the user behavior are merged with the clustering process, the latent factor model, and matrix decomposition. We have implemented our method and evaluated its performance using K-means and K-means++ clustering. The results show that the scheme can auto tags over encrypted data, and the tag also meets the actual situation, which proves the validity and generality of the scheme.https://ieeexplore.ieee.org/document/8913457/User behavior clusteringencrypted dataclustering with tagging |
spellingShingle | Minghui Gao Bo Li Chen Wang Li Ma Jian Xu User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data IEEE Access User behavior clustering encrypted data clustering with tagging |
title | User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data |
title_full | User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data |
title_fullStr | User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data |
title_full_unstemmed | User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data |
title_short | User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data |
title_sort | user behavior clustering scheme with automatic tagging over encrypted data |
topic | User behavior clustering encrypted data clustering with tagging |
url | https://ieeexplore.ieee.org/document/8913457/ |
work_keys_str_mv | AT minghuigao userbehaviorclusteringschemewithautomatictaggingoverencrypteddata AT boli userbehaviorclusteringschemewithautomatictaggingoverencrypteddata AT chenwang userbehaviorclusteringschemewithautomatictaggingoverencrypteddata AT lima userbehaviorclusteringschemewithautomatictaggingoverencrypteddata AT jianxu userbehaviorclusteringschemewithautomatictaggingoverencrypteddata |