The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Performance Study of Secure Data Mining on the Cell Processor
Abstract
This article examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing power. However, privacy and security concerns prevent using volunteer computing for data mining of sensitive data. The Cell processor comes with hardware security features. The secure volunteer data mining can be achieved by using those hardware security features. In this article, we present a general security scheme for the volunteer computing, and a secure parallelized K-Means clustering algorithm for the Cell processor. We also evaluate the performance of the algorithm on the Cell secure system simulator. Evaluation results indicate that the proposed secure data clustering outperforms a non-secure clustering algorithm on the general purpose CPU, but incurs a huge performance overhead introduced by the decryption process of the Cell security features. Possible optimization for the secure K-Means clustering is discussed.
Related Content
Hossam Nabil Elshenraki.
© 2024.
23 pages.
|
Ibtesam Mohammed Alawadhi.
© 2024.
9 pages.
|
Akashdeep Bhardwaj.
© 2024.
33 pages.
|
John Blake.
© 2024.
12 pages.
|
Wasswa Shafik.
© 2024.
36 pages.
|
Amar Yasser El-Bably.
© 2024.
12 pages.
|
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav.
© 2024.
23 pages.
|
|
|