TY - GEN
T1 - A performance study of secure data mining on the cell processor
AU - Wang, Hong
AU - Takizawa, Hiroyuki
AU - Kobayashi, Hiroaki
PY - 2008
Y1 - 2008
N2 - This paper examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing power. However, privacy and security concerns prevent using volunteer computing for data mining of sensitive data. The Cell processor comes with a hardware security feature. The secure volunteer data mining can be achieved by using this hardware security feature. In this paper, we present a general security scheme for the volunteer computing, and a secure parallelized K-Means clustering algorithm for the Cell processor. We also evaluate the performance of the algorithm on the Cell secure system simulator. Evaluation results indicate that the proposed secure data clustering outperforms a non-secure clustering algorithm on the general purpose CPU, but incurs a huge performance overhead introduced by the decryption process of the Cell security features.
AB - This paper examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing power. However, privacy and security concerns prevent using volunteer computing for data mining of sensitive data. The Cell processor comes with a hardware security feature. The secure volunteer data mining can be achieved by using this hardware security feature. In this paper, we present a general security scheme for the volunteer computing, and a secure parallelized K-Means clustering algorithm for the Cell processor. We also evaluate the performance of the algorithm on the Cell secure system simulator. Evaluation results indicate that the proposed secure data clustering outperforms a non-secure clustering algorithm on the general purpose CPU, but incurs a huge performance overhead introduced by the decryption process of the Cell security features.
UR - http://www.scopus.com/inward/record.url?scp=50649117591&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50649117591&partnerID=8YFLogxK
U2 - 10.1109/CCGRID.2008.16
DO - 10.1109/CCGRID.2008.16
M3 - Conference contribution
AN - SCOPUS:50649117591
SN - 9780769531564
T3 - Proceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid
SP - 633
EP - 638
BT - Proceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid
T2 - CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid
Y2 - 19 May 2008 through 22 May 2008
ER -