A Performance Study of Secure Data Mining on the Cell Processor

A Performance Study of Secure Data Mining on the Cell Processor

Hong Wang (Tohoku University, Japan), Hiroyuki Takizawa (Tohoku University, Japan) and Hiroaki Kobayashi (Tohoku University, Japan)
Copyright: © 2009 |Pages: 15
DOI: 10.4018/jghpc.2009040103
OnDemand PDF Download:


This article examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing power. However, privacy and security concerns prevent using volunteer computing for data mining of sensitive data. The Cell processor comes with hardware security features. The secure volunteer data mining can be achieved by using those hardware security features. In this article, we present a general security scheme for the volunteer computing, and a secure parallelized K-Means clustering algorithm for the Cell processor. We also evaluate the performance of the algorithm on the Cell secure system simulator. Evaluation results indicate that the proposed secure data clustering outperforms a non-secure clustering algorithm on the general purpose CPU, but incurs a huge performance overhead introduced by the decryption process of the Cell security features. Possible optimization for the secure K-Means clustering is discussed.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2017): Forthcoming, Available for Pre-Order
Volume 8: 4 Issues (2016): 3 Released, 1 Forthcoming
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing