Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Privacy-preserving collaborative recommender systems

Published: 01 July 2010 Publication History

Abstract

Collaborative recommender systems use various types of information to help customers find products of personalized interest. To increase the usefulness of collaborative recommender systems in certain circumstances, it could be desirable to merge recommender system databases between companies, thus expanding the data pool. This can lead to privacy disclosure hazards during the merging process. This paper addresses how to avoid privacy disclosure in collaborative recommender systems by comparing withmajor cryptology approaches and constructing amore efficient privacy-preserving collaborative recommender system based on the scalar product protocol.

References

[1]
E. Aimeur, G. Brassard, J. M. Fernandez, and F. S. M. Onana, "Alambic: Aprivacy-preserving recommender system for electronic commerce," Int. J. Inf. Secur., vol. 7, no. 5, pp. 307-334, 2008.
[2]
A. Bergholz, "Coping with sparsity in a recommender system," Lecture Notes Comput. Sci., vol. 2703, pp. 86-99, 2003.
[3]
S. Berkovsky, Y. Eytani, T. Kuflik, and F. Ricci, "Enhancing privacy and preserving accuracy of a distributed collaborative filtering," in Proc. ACM Conf. Recommender Syst. (Proc. RecSys 2007), pp. 9-16.
[4]
J. Breese, D. Heckerman, and C. Kadie, "Empirical analysis of predictive algorithms for collaborative filtering," in Proc. 14th Conf. Uncertainty Artif. Intell. (UAI 1998), pp. 43-52.
[5]
R. Burke, "Knowledge-based recommender systems," in Encyclopedia of Library and Information Systems, A. Kent, Ed. vol. 69, supp. 32, New York: Marcel Dekker, 2000. Available: citeseer.ist.psu.edu/article/ burke00knowledgebased.html
[6]
J. Canny, "Collaborative filtering with privacy via factor analysis," in Proc. 25th Annu. Int. ACM SIGIR Conf. Res. Dev. Inf. Retrieval, pp. 238-245, 2002.
[7]
W. Du and Z. Zhan, "A practical approach to solve secure multiparty computation problems," presented at the ACM New Security Paradigms Workshop, Virginia Beach, VA, Sep. 23-26, 2002.
[8]
B. Shapira, P. Shoval, and U. Hanani, "Information filtering: Overview of issues, research and systems," User Model and User-Adapted Interaction, vol. 11, no. 3, pp. 203-259, 2001.
[9]
C. Hsieh, J. Zhan, D. Zeng, and F. Wang, "Preserving privacy in joining recommender systems," in Proc. Int. Conf. Inf. Security Assur. (ISA 2008), pp. 561-566.
[10]
Z. Huang, H. Chen, and D. Zeng, "Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering," ACM Trans. Inf. Syst., vol. 22, pp. 116-142, 2004.
[11]
I. Im and A. Hars, "Does a one-size recommendation system fit all? The effectiveness of collaborative filtering based recommendation systems across different domains and search modes," ACM Trans. Inf. Syst., vol. 26, no. 1, 4 pp., 2007.
[12]
H. Suwa, H. Yamamoto, I. Okada, Y. Ogawa, and T. Ohta, "Development of recommender systems using user preference tendencies: An algorithm for diversifying recommendation," Towards Sustainable Soc. Ubiquitous Netw., vol. 286, pp. 61-73, 2008.
[13]
M. Pazzani and D. Billsus, "Content-based recommendation systems," Lect. Notes Comput. Sci., vol. 4321, pp. 325-341, 2007.
[14]
H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," in Proc. 3rd IEEE Int. Conf. Data Mining (ICDM 2003), pp. 625-628.
[15]
P. Resnick and H. Varian, "Recommender systems," Commun. ACM, vol. 40, no. 3, pp. 56-58, 1997.
[16]
J. Schafer, J. Konstan, and J. Riedi, "Recommender systems in e-commerce," in Proc. 1st ACM Conf. Electron. Commerce, pp. 158-166.
[17]
U. Shardanand and P. Maes, "Social information filtering: Algorithms for automating "word of mouth"," in Proc. ACM 1995 Conf. Human Factors Comput. Syst., New York: ACM Press, 1995, pp. 210-217.
[18]
C. Shen, J. Zhan, D. Wang, T. Hsu, and C. Liau, "Information theoretically secure number product protocol," in Proc. Int. Conf. Mach. Learning Cybern., Aug. 19-22, 2007, pp. 3006-3011.
[19]
L. Sweeney, "k-anonymity: A model for protecting privacy," in Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
[20]
I. Wang, C. Shen, Z. Zhan, T. Hsu, C. Liau, and D. Wang, "Empirical evaluations of secure scalar product," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 39, no. 4, pp. 410-419, Jul. 2009.
[21]
A. C. Yao, "Protocols for secure computations," in Proc. 23rd Annu. IEEE Symp. Found. Comput. Sci., 1982, pp. 1-5.
[22]
J. Zhan, "Privacy-preserving collaborative data mining," IEEE Comput. Intell. Mag., vol. 3, no. 2, pp. 31-41, 2008.
[23]
J. Zhan, S. Matwin, and L. Chang, "Privacy-preserving collaborative association rule mining," J. Netw. Comput. Appl., vol. 30, pp. 1216-1227, 2007.
[24]
Z. Zhan and L. Chang, "Privacy-preserving collaborative data mining," in Proc. IEEE Int. Workshop Found. New Directions Data Mining, Melbourne, FL, Nov. 19-22, 2003, p. 208.
[25]
Z. Zhan, I. Wang, C. Hsieh, T. Hsu, C. Liau, and D. Wang, "Towards efficient privacy-preserving recommender systems," in Proc. IEEE Int. Conf. Granular Comput., Hangzhou, China, Aug. 2008, pp. 778-783.

Cited By

View all
  • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/36528913:2(1-68)Online publication date: 13-Apr-2024
  • (2023)Cookie consent has disparate impact on estimation accuracyProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3667610(34308-34328)Online publication date: 10-Dec-2023
  • (2023)Recommender Systems in CybersecurityKnowledge and Information Systems10.1007/s10115-023-01906-665:12(5523-5559)Online publication date: 5-Jun-2023
  • Show More Cited By
  1. Privacy-preserving collaborative recommender systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
    IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews  Volume 40, Issue 4
    July 2010
    122 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 July 2010
    Accepted: 28 November 2009
    Revised: 07 January 2009
    Received: 14 July 2008

    Author Tags

    1. Privacy
    2. privacy
    3. recommender system
    4. security

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/36528913:2(1-68)Online publication date: 13-Apr-2024
    • (2023)Cookie consent has disparate impact on estimation accuracyProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3667610(34308-34328)Online publication date: 10-Dec-2023
    • (2023)Recommender Systems in CybersecurityKnowledge and Information Systems10.1007/s10115-023-01906-665:12(5523-5559)Online publication date: 5-Jun-2023
    • (2022)Practitioners Versus Users: A Value-Sensitive Evaluation of Current Industrial Recommender System DesignProceedings of the ACM on Human-Computer Interaction10.1145/35556466:CSCW2(1-32)Online publication date: 11-Nov-2022
    • (2021)DP-UserPro: differentially private user profile construction and publicationFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-020-9462-915:5Online publication date: 1-Oct-2021
    • (2021)Dare‐to‐ShareSecurity and Privacy10.1002/spy2.1534:3Online publication date: 4-May-2021
    • (2020)Feature selection by using privacy-preserving of recommendation systems based on collaborative filtering and mutual trust in social networksSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-019-04605-z24:15(11425-11440)Online publication date: 1-Aug-2020
    • (2019)PDMFRecProceedings of the 13th ACM Conference on Recommender Systems10.1145/3298689.3347035(457-461)Online publication date: 10-Sep-2019
    • (2019)Hand Gesture Recognition with Convolution Neural Networks2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)10.1109/IRI.2019.00054(295-298)Online publication date: 30-Jul-2019
    • (2019)A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injectionMultimedia Tools and Applications10.1007/s11042-017-4352-378:19(26907-26926)Online publication date: 1-Oct-2019
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media