{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T06:33:14Z","timestamp":1714545194733},"reference-count":29,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T00:00:00Z","timestamp":1591660800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems"],"published-print":{"date-parts":[[2021,11]]},"abstract":"Abstract<\/jats:title>Secure collaborative data clustering using SecureCL is presented. SecureCL is founded on the concept of \u03a6\u2010data implemented using Super Secure Chain Distance Matrices and encrypted using Multi\u2010User Order Preserving Encryption. The advantage offered, unlike comparable systems, is that SecureCL does not require any user participation once the \u03a6\u2010data proxy has been encrypted; it does not require recourse to Secure Multi\u2010Party Computation protocols or \u2018secret sharing\u2019 mechanisms. The utility of SecureCL is illustrated using Nearest Neighbour Clustering and Density\u2010Based Spatial Clustering of Applications with Noise, although it can be applied to any data clustering algorithm that involves distance comparison. The reported experiments demonstrate that SecureCL can produce securely cluster configurations comparable to those produced using standard, non\u2010encrypted, approaches without entailing any significant computational overhead, thus indicating its suitability in the context of Data Mining as a Service.<\/jats:p>","DOI":"10.1111\/exsy.12581","type":"journal-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T10:15:18Z","timestamp":1591697718000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure third\u2010party data clustering using SecureCL<\/scp>, \u03a6\u2010data and multi\u2010user order preserving encryption"],"prefix":"10.1111","volume":"38","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6601-5668","authenticated-orcid":false,"given":"Nawal","family":"Almutairi","sequence":"first","affiliation":[{"name":"Information Technology Department College of Computer and Information Sciences, King Saud University Riyadh Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1026-6649","authenticated-orcid":false,"given":"Frans","family":"Coenen","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Liverpool Liverpool UK"}]},{"given":"Keith","family":"Dures","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Liverpool Liverpool UK"}]}],"member":"311","published-online":{"date-parts":[[2020,6,9]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_2_10_3_1","first-page":"3","volume-title":"Artificial intelligence","author":"Almutairi N.","year":"2018"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98539-8_13"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBCON.2017.7998473"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/582353.582376"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_2_10_8_1","volume-title":"Secure multi\u2010party computation (manuscript, preliminary version 78)","author":"Goldreich O.","year":"1998"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2008.4744034"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73871-8_7"},{"key":"e_1_2_10_13_1","unstructured":"Lichman M. (2013).UCI Machine Learning Repository. Retrieved fromhttp:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2992"},{"key":"e_1_2_10_15_1","first-page":"69","article-title":"Privacy preserving distributed DBSCAN clustering","volume":"6","author":"Liu J.","year":"2013","journal-title":"Transactions on Data Privacy"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.011"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.07.001"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015496"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1994.2209"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.03.009"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.42"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2364027"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_10_26_1","doi-asserted-by":"crossref","unstructured":"Shaneck M. Kim Y. &Kumar V.(2006).Privacy Preserving Nearest Neighbor Search. Paper presented at Sixth IEEE International Conference on Data Mining Hong Kong China.","DOI":"10.1109\/ICDMW.2006.133"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.174"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"}],"container-title":["Expert Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fexsy.12581","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.12581","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1111\/exsy.12581","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.12581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T19:37:20Z","timestamp":1693337840000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/exsy.12581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,9]]},"references-count":29,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["10.1111\/exsy.12581"],"URL":"https:\/\/doi.org\/10.1111\/exsy.12581","archive":["Portico"],"relation":{},"ISSN":["0266-4720","1468-0394"],"issn-type":[{"value":"0266-4720","type":"print"},{"value":"1468-0394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,9]]},"assertion":[{"value":"2019-04-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}