Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1882992.1883018acmotherconferencesArticle/Chapter ViewAbstractPublication PagesihiConference Proceedingsconference-collections
research-article

Reliable medical recommendation systems with patient privacy

Published: 11 November 2010 Publication History

Abstract

One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure any sensitive medical information collected by the system is properly secured. In this paper we codify these privacy concerns in a privacy-friendly framework and present two architectures that realize it: the Secure Processing Architecture (SPA) and the Anonymous Contributions Architecture (ACA). In SPA, patients submit their ratings in a protected form without revealing any information about their data, and the computation of recommendations proceeds over the protected data using secure multi-party computation techniques. In ACA, patients submit their ratings in the clear, but no link between a submission and patient data can be made. We discuss various aspects of both architectures including techniques for ensuring reliability of computed recommendations and system performance, and provide their comparison.

References

[1]
Anonymizer, Inc. http://www.anonymizer.com.
[2]
Shadowsurf. http://www.shadowsurf.com/.
[3]
Tor: anonymity online. http://www.torproject.org.
[4]
D. Boneh and M. K. Franklin. Efficient generation of shared RSA keys. In CRYPTO'97, pages 425--439, 1997.
[5]
P. Bunn and R. Ostrovsky. Secure two-party k-means clustering. In CCS'07, pages 486--497, 2007.
[6]
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143--202, 2000.
[7]
J. F. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45--57, 2002.
[8]
J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR'02, pages 238--245, 2002.
[9]
D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT'91, pages 257--265, 1991.
[10]
P.-A. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. In WIDM'05, pages 67--74, 2005.
[11]
I. DamgÚard and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In PKC'01, pages 119--136, 2001.
[12]
I. DamgÚard and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In EUROCRYPT'01, pages 152--165, 2001.
[13]
T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), Jan. 1999.
[14]
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard), Apr. 2006.
[15]
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008.
[16]
C. Dwork. Differential privacy. In ICALP'06, pages 1--12, 2006.
[17]
C. Dwork. Differential privacy: A survey of results. In TAMC'08, pages 1--19, 2008.
[18]
P.-A. Fouque, G. Poupard, and J. Stern. Sharing decryption in the context of voting or lotteries. In FC'00, volume 1962 of LNCS, pages 90--104, 2000.
[19]
T. R. Hoens, M. Blanton, and N. Chawla. A private and reliable recommendation system using a social network. Technical Report 2010--05, Department of CSE, University of Notre Dame, 2010.
[20]
M. Jamali and M. Ester. TrustWalker: a random walk model for combining trust-based and item-based recommendation. In KDD'09, pages 397--406, 2009.
[21]
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM'03, pages 99--106, 2003.
[22]
S. Katzenbeisser and M. Petkovic. Privacy-preserving recommendation systems for consumer healthcare services. In ARES'08, pages 889--895, 2008.
[23]
S. K. Lam. and J. Riedl. Shilling recommender systems for fun and profit. In WWW'04, pages 393--402, 2004.
[24]
P. Massa and P. Avesani. Trust-aware collaborative filtering for recommender systems. In CoopIS'04, volume 3290 of LNCS, pages 492--508, 2004.
[25]
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the Netflix prize contenders. In KDD'09, pages 627--636, 2009.
[26]
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT'99, pages 223--238, 1999.
[27]
H. Polat and W. Du. SVD-based collaborative filtering with privacy. In SAC'05, pages 791--795, 2005.
[28]
B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT'06, pages 522--537, 2006.
[29]
S. Zhang, J. Ford, and F. Makedon. A privacy-preserving collaborative filtering scheme with two-way communication. In EC'06, pages 316--323, 2006.

Cited By

View all
  • (2024)The Implementation of Recommender Systems for Mental Health Recovery Narratives: Evaluation of Use and PerformanceJMIR Mental Health10.2196/4575411(e45754)Online publication date: 29-Mar-2024
  • (2021)Similarity-Maintaining Privacy Preservation and Location-Aware Low-Rank Matrix Factorization for QoS Prediction Based Web Service RecommendationIEEE Transactions on Services Computing10.1109/TSC.2018.283974114:3(889-902)Online publication date: 1-May-2021
  • (2021)Recommender Systems Beyond E-Commerce: Presence and FutureConsumer Happiness: Multiple Perspectives10.1007/978-981-33-6374-8_14(203-230)Online publication date: 6-May-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IHI '10: Proceedings of the 1st ACM International Health Informatics Symposium
November 2010
886 pages
ISBN:9781450300308
DOI:10.1145/1882992
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. framework
  2. privacy
  3. recommendation systems

Qualifiers

  • Research-article

Conference

IHI '10
IHI '10: ACM International Health Informatics Symposium
November 11 - 12, 2010
Virginia, Arlington, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Implementation of Recommender Systems for Mental Health Recovery Narratives: Evaluation of Use and PerformanceJMIR Mental Health10.2196/4575411(e45754)Online publication date: 29-Mar-2024
  • (2021)Similarity-Maintaining Privacy Preservation and Location-Aware Low-Rank Matrix Factorization for QoS Prediction Based Web Service RecommendationIEEE Transactions on Services Computing10.1109/TSC.2018.283974114:3(889-902)Online publication date: 1-May-2021
  • (2021)Recommender Systems Beyond E-Commerce: Presence and FutureConsumer Happiness: Multiple Perspectives10.1007/978-981-33-6374-8_14(203-230)Online publication date: 6-May-2021
  • (2020)Recommender systems in the healthcare domain: state-of-the-art and research issuesJournal of Intelligent Information Systems10.1007/s10844-020-00633-657:1(171-201)Online publication date: 17-Dec-2020
  • (2019)A Survey on Personalized News Recommendation TechnologyIEEE Access10.1109/ACCESS.2019.29449277(145861-145879)Online publication date: 2019
  • (2018)Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2018.00055(466-477)Online publication date: Jun-2018
  • (2015)Collaborative filtering under a sybil attackProceedings of the Eighth European Workshop on System Security10.1145/2751323.2751328(1-6)Online publication date: 21-Apr-2015
  • (2015)Personalized location aware recommendation system2015 International Conference on Advanced Computing and Communication Systems10.1109/ICACCS.2015.7324140(1-6)Online publication date: Jan-2015
  • (2014)Opinions of peopleACM SIGAPP Applied Computing Review10.1145/2670967.267096814:3(7-21)Online publication date: 22-Sep-2014
  • (2013)Reliable medical recommendation systems with patient privacyACM Transactions on Intelligent Systems and Technology10.1145/2508037.25080484:4(1-31)Online publication date: 8-Oct-2013
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media