Collaborative Data Processing; Distributed Computing; Distributed Learning; Edge Computing; k-means Clustering; Trustworthiness; Collaborative data processing; Computing system; Critical challenges; Distributed clustering; Distributed learning; Edge computing; Edge nodes; K-means++ clustering; Sensors network; Computer Science Applications; Decision Sciences (miscellaneous); Information Systems and Management; Control and Optimization; Modeling and Simulation
Abstract :
[en] Ensuring data trustworthiness within individual edge nodes while facilitating collaborative data processing poses a critical challenge in edge computing systems (ECS), particularly in resource-constrained scenarios such as autonomous systems sensor networks, industrial IoT, and smart cities. This paper presents a lightweight, fully distributed k-means clustering algorithm specifically adapted for edge environments, leveraging a distributed averaging approach with additive secret sharing, a secure multiparty computation technique, during the cluster center update phase to ensure the accuracy and trustworthiness of data across nodes.
Disciplines :
Computer science
Author, co-author :
LI, Hongyang ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PCOG
Wu, Caesar; University of Luxembourg, Luxembourg
Chadli, Mohammed; University Paris-Saclay, France
Mammar, Said; University Paris-Saclay, France
BOUVRY, Pascal ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
External co-authors :
yes
Language :
English
Title :
Lightweight Trustworthy Distributed Clustering
Publication date :
05 August 2025
Event name :
2025 37th Chinese Control and Decision Conference (CCDC)
Event place :
Xiamen, Chn
Event date :
16-05-2025 => 19-05-2025
Audience :
International
Main work title :
Proceedings of the 37th Chinese Control and Decision Conference, CCDC 2025
W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, "Edge computing: A survey," Future Generation Computer Systems, vol. 97, pp. 219-235, 2019.
Q. Li, J. S. Gundersen, M. Lopuhaä-Zwakenberg, and R. Heusdens, "Adaptive differentially quantized subspace perturbation (adqsp): A unified framework for privacy-preserving distributed average consensus," IEEE Transactions on Information Forensics and Security, 2023.
H. Li, C. Wu, M. Chadli, S. Mammar, and P. Bouvry, "Trustworthiness of stochastic gradient descent in distributed learning," arXiv preprint arXiv:2410.21491, 2024.
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE internet of things journal, vol. 3, no. 5, pp. 637-646, 2016.
Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, "A survey on mobile edge computing: The communication perspective," IEEE communications surveys & tutorials, vol. 19, no. 4, pp. 2322-2358, 2017.
D. Mosk-Aoyama, T. Roughgarden, and D. Shah, "Fully distributed algorithms for convex optimization problems," SIAM Journal on Optimization, vol. 20, no. 6, pp. 3260-3279, 2010.
R. Azimi, H. Sajedi, and M. Ghayekhloo, "A distributed data clustering algorithm in p2p networks," Applied Soft Computing, vol. 51, pp. 147-167, 2017.
C. Jiang, T. Fan, H. Gao, W. Shi, L. Liu, C. Cérin, and J. Wan, "Energy aware edge computing: A survey," Computer Communications, vol. 151, pp. 556-580, 2020.
S. Pei, Y. Sun, F. Nie, X. Jiang, and Z. Zheng, "Adaptive graph k-means," Pattern Recognition, vol. 161, p. 111226, 2025.
J. Huang, Q. Feng, Z. Huang, J. Xu, and J. Wang, "Near-linear time approximation algorithms for k-means with outliers," in Forty-first International Conference on Machine Learning, 2024.
G. Hamerly and C. Elkan, "Learning the k in k-means," Advances in neural information processing systems, vol. 16, 2003.
B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, "Communication-efficient learning of deep networks from decentralized data," in Artificial intelligence and statistics. PMLR, 2017, pp. 1273-1282.
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in ACM Sigmod Record, vol. 29, no. 2. ACM, 2000, pp. 439-450.
B. Johansson and M. Johansson, "Faster linear iterations for distributed averaging," IFAC Proceedings Volumes, vol. 41, no. 2, pp. 2861-2866, 2008.
S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," IEEE transactions on information theory, vol. 52, no. 6, pp. 2508-2530, 2006.
A. G. Dimakis, S. Kar, J. M. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal processing," Proceedings of the IEEE, vol. 98, no. 11, pp. 1847-1864, 2010.
O. S. Egwuche, A. Singh, A. E. Ezugwu, J. Greeff, M. O. Olusanya, and L. Abualigah, "Machine learning for coverage optimization in wireless sensor networks: A comprehensive review," Annals of Operations Research, pp. 1-67, 2023.
K. R. Rao, B. N. K. Reddy, and A. S. Kumar, "Using advanced distributed energy efficient clustering increasing the network lifetime in wireless sensor networks," Soft Computing, vol. 27, no. 20, pp. 15 269-15 280, 2023.
D. K. Bangotra, Y. Singh, A. Selwal, N. Kumar, and P. K. Singh, "A trust based secure intelligent opportunistic routing protocol for wireless sensor networks," Wireless Personal Communications, vol. 127, no. 2, pp. 1045-1066, 2022.
C. Sureshkumar and S. Sabena, "Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks," Wireless Personal Communications, vol. 112, no. 3, pp. 1517-1536, 2020.
C. Lv, Y. Ren, X. Li, P. Wang, Z. Du, G. Ma, and H. Chi, "Unmanned aerial vehicle-assisted sparse sensing in wireless sensor networks," IEEE Wireless Communications Letters, vol. 12, no. 6, pp. 977-981, 2023.
H. Feng, J. Wang, Z. Fang, J. Qian, and K.-C. Chen, "Age of information in uav aided wireless sensor networks relying on blockchain," IEEE Transactions on Vehicular Technology, vol. 72, no. 9, pp. 12 430-12 435, 2023.
S. Samet, A. Miri, and L. Orozco-Barbosa, "Privacy preserving k-means clustering in multi-party environment." in SECRYPT, 2007, pp. 381-385.
C. Su, F. Bao, J. Zhou, T. Takagi, and K. Sakurai, "Privacy-preserving two-party k-means clustering via secure approximation," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), vol. 1. IEEE, 2007, pp. 385-391.
P. Bunn and R. Ostrovsky, "Secure two-party k-means clustering," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 486-497.
M. C. Doganay, T. B. Pedersen, Y. Saygin, E. Savas, and A. Levi, "Distributed privacy preserving k-means clustering with additive secret sharing," in Proceedings of the 2008 international workshop on Privacy and anonymity in information society. ACM, 2008, pp. 3-11.
K. Xing, C. Hu, J. Yu, X. Cheng, and F. Zhang, "Mutual privacy preserving k-means clustering in social participatory sensing," IEEE Transactions on Industrial Informatics, vol. 13, no. 4, pp. 2066-2076, 2017.
Y. Fan, J. Bai, X. Lei, W. Lin, Q. Hu, G. Wu, J. Guo, and G. Tan, "Ppmck: Privacy-preserving multi-party computing for k-means clustering," Journal of Parallel and Distributed Computing, vol. 154, pp. 54-63, 2021.
D. Zhao, X. Hu, S. Xiong, J. Tian, J. Xiang, J. Zhou, and H. Li, "Kmeans clustering and knn classification based on negative databases," Applied soft computing, vol. 110, p. 107732, 2021.
Q. Li and L. Luo, "On the privacy of federated clustering: A cryptographic view," in ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2024, pp. 4865-4869.
J. Sakuma and S. Kobayashi, "Large-scale k-means clustering with user-centric privacy-preservation," Knowledge and Information Systems, vol. 25, no. 2, pp. 253-279, 2010.
O. Goldreich, Foundations of cryptography: volume 2, basic applications. Cambridge university press, 2009.
F. Meskine and S. N. Bahloul, "Privacy preserving k-means clustering: A survey research." Int. Arab J. Inf. Technol., vol. 9, no. 2, pp. 194-200, 2012.
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 1999, pp. 223-238.
A. C.-C. Yao, "How to generate and exchange secrets," in Foundations of Computer Science, 1986., 27th Annual Symposium on. IEEE, 1986, pp. 162-167.
S. Boyd, N. Parikh, E. Chu, B. Peleato, J. Eckstein et al., "Distributed optimization and statistical learning via the alternating direction method of multipliers," Foundations and Trends in Machine learning, vol. 3, no. 1, pp. 1-122, 2011.
G. Zhang and R. Heusdens, "Distributed optimization using the primaldual method of multipliers," IEEE Transactions on Signal and Information Processing over Networks, vol. 4, no. 1, pp. 173-187, 2018.
R. Cramer, I. B. Damgrd, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing, 1st ed. New York, NY, USA: Cambridge University Press, 2015.
N. Gupta, J. Katz, N. Chopra, "Privacy in distributed average consensus," IFAC-PapersOnLine, vol. 50, no. 1, pp. 9515-9520, 2017.
X. Lin, C. Clifton, and M. Zhu, "Privacy-preserving clustering with distributed em mixture modeling," Knowledge and information systems, vol. 8, no. 1, pp. 68-81, 2005.
R. L. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation," IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 82-105, 2013.