Differentially Private k-Means Clustering with Convergence Guarantee
Lu, Zhigang, and Shen, Hong (2021) Differentially Private k-Means Clustering with Convergence Guarantee. IEEE Transactions on Dependable and Secure Computing, 18 (4). pp. 1541-1552.
PDF (Published Version)
- Published Version
Restricted to Repository staff only |
Abstract
Iterative clustering around representative points is an effective technique for clustering and helps us learn insights behind data to support various important applications. Unfortunately, it also provides security holes which may allow adversaries to infer the privacy of individuals with some background knowledge. To protect individual privacy against such inference attacks, preserving differential privacy for iterative clustering algorithms has been extensively studied. Existing differentially private clustering algorithms adopt the same framework to compute differentially private centroids iteratively by running Lloyd's k-means algorithm to obtain the actual centroids, then perturbing them with a differential privacy mechanism. These algorithms suffer from the problem of no convergence guarantee, i.e., they provide no guarantee of termination at a solution of Lloyd's algorithm within a bounded number of iterations. This problem severely impacts their clustering quality and execution efficiency. To address this problem, this article follows the same centroid updating pattern as existing work in interactive settings; however we propose a novel framework for injecting differential privacy into the actual centroids. Specifically, to ensure convergence, we maintain the perturbed centroids of the previous iteration t -1 to compute a convergence zone for each cluster in the current iteration t , where we inject differential privacy noise. To achieve a satisfactory convergence rate, we further control the orientation of centroid movement in each cluster using two strategies: one takes the orientation of centroid movement from iteration t -1 to iteration t (past knowledge); the other uses the additional information of the orientation from iteration t +1 (future knowledge). We prove that, in the expected case, our algorithm (in both strategies) converges to a solution of Lloyd's algorithm in at most twice as many iterations as Lloyd's algorithm. Furthermore, when using both past and future knowledge, we prove that our algorithm converges to the same solution as Lloyd's algorithm (for the same initial centroids) with high probability, at the cost of a slower convergence speed compared to using only past knowledge due to duplicated operations in each iteration required for computing the future knowledge. We perform experimental evaluations on seven widely used real-world datasets. The experimental results show that our algorithm outperforms the state-of-the-art methods for interactive differentially private clustering with a guaranteed convergence and better clustering quality whilst meeting the same differential privacy requirements.
Item ID: | 77406 |
---|---|
Item Type: | Article (Research - C1) |
ISSN: | 1941-0018 |
Copyright Information: | © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. |
Funders: | Australian Research Council (ARC), National Key Research and Development Plan of China (NKRDP), University of Adelaide |
Projects and Grants: | ARC Discovery Project DP150104871, NKRDP Project #2017YFB0203201 |
Date Deposited: | 07 Feb 2023 21:22 |
FoR Codes: | 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460402 Data and information privacy @ 100% |
SEO Codes: | 22 INFORMATION AND COMMUNICATION SERVICES > 2204 Information systems, technologies and services > 220405 Cybersecurity @ 100% |
More Statistics |