TY - JOUR
T1 - A performance study of secure data mining on the cell processor
AU - Wang, Hong
AU - Takizawa, Hiroyuki
AU - Kobayashi, Hiroaki
PY - 2009
Y1 - 2009
N2 - This article examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing power. However, privacy and security concerns prevent using volunteer computing for data mining of sensitive data. The Cell processor comes with hardware security features. The secure volunteer data mining can be achieved by using those hardware security features. In this article, we present a general security scheme for the volunteer computing, and a secure parallelized K-Means clustering algorithm for the Cell processor. We also evaluate the performance of the algorithm on the Cell secure system simulator. Evaluation results indicate that the proposed secure data clustering outperforms a non-secure clustering algorithm on the general purpose CPU, but incurs a huge performance overhead introduced by the decryption process of the Cell security features. Possible optimization for the secure K-Means clustering is discussed.
AB - This article examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing power. However, privacy and security concerns prevent using volunteer computing for data mining of sensitive data. The Cell processor comes with hardware security features. The secure volunteer data mining can be achieved by using those hardware security features. In this article, we present a general security scheme for the volunteer computing, and a secure parallelized K-Means clustering algorithm for the Cell processor. We also evaluate the performance of the algorithm on the Cell secure system simulator. Evaluation results indicate that the proposed secure data clustering outperforms a non-secure clustering algorithm on the general purpose CPU, but incurs a huge performance overhead introduced by the decryption process of the Cell security features. Possible optimization for the secure K-Means clustering is discussed.
KW - Cell be
KW - Data mining
KW - Performance evaluation
KW - Secure data processing
KW - Volunteer computing
UR - http://www.scopus.com/inward/record.url?scp=77955110745&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955110745&partnerID=8YFLogxK
U2 - 10.4018/jghpc.2009040103
DO - 10.4018/jghpc.2009040103
M3 - Article
AN - SCOPUS:77955110745
SN - 1938-0259
VL - 1
SP - 30
EP - 44
JO - International Journal of Grid and High Performance Computing
JF - International Journal of Grid and High Performance Computing
IS - 2
ER -