Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI

Published: 19 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Recommendation systems powered by artificial intelligence (AI) are widely used to improve user experience. However, AI inevitably raises privacy leakage and other security issues due to the utilization of extensive user data. Addressing these challenges can protect users’ personal information, benefit service providers, and foster service ecosystems. Presently, numerous techniques based on differential privacy have been proposed to solve this problem. However, existing solutions encounter issues such as inadequate data utilization and a tenuous trade-off between privacy protection and recommendation effectiveness. To enhance recommendation accuracy and protect users’ private data, we propose ID-SR, a novel privacy-preserving social recommendation scheme for trustworthy AI based on the infinite divisibility of Laplace distribution. We first introduce a novel recommendation method adopted in ID-SR, which is established based on matrix factorization with a newly designed social regularization term for improving recommendation effectiveness. We then propose a differential privacy-preserving scheme tailored to the above method that leverages the Laplace distribution’s characteristics to safeguard user data. Theoretical analysis and experimentation evaluation on two publicly available datasets demonstrate that our scheme achieves a superior balance between privacy protection and recommendation effectiveness, ultimately delivering an enhanced user experience.

    References

    [1]
    Zhiqi Bu, Jinshuo Dong, Qi Long, and Weijie J. Su. 2020. Deep learning with Gaussian differential privacy. Harvard Data Science Review 2020, 23 (2020), 10–1162.
    [2]
    Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, and Vitaly Shmatikov. 2011. “You might also like:” Privacy risks of collaborative filtering. In 2011 IEEE Symposium on Security and Privacy. IEEE, 231–246.
    [3]
    Fran Casino, Josep Domingo-Ferrer, Constantinos Patsakis, Domènec Puig, and Agusti Solanas. 2015. A k-anonymous approach to privacy preserving collaborative filtering. J. Comput. System Sci. 81, 6 (2015), 1000–1011.
    [4]
    Kamalika Chaudhuri, Claire Monteleoni, and Anand D. Sarwate. 2011. Differentially private empirical risk minimization. Journal of Machine Learning Research 12, 3 (2011), 1069–1109.
    [5]
    Hai Chen, Fulan Qian, Chang Liu, Yanping Zhang, Hang Su, and Shu Zhao. 2023. Training robust deep collaborative filtering models via adversarial noise propagation. ACM Transactions on Information Systems 42, 1 (2023), 1–27.
    [6]
    Cynthia Dwork. 2006. Differential privacy. In International Colloquium on Automata, Languages, and Programming. Springer, 1–12.
    [7]
    Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science 9, 3–4 (2014), 211–407.
    [8]
    Arik Friedman, Shlomo Berkovsky, and Mohamed Ali Kaafar. 2016. A differential privacy framework for matrix factorization recommender systems. User Modeling and User-Adapted Interaction 26 (2016), 425–458.
    [10]
    Guibing Guo, Jie Zhang, Daniel Thalmann, and Neil Yorke-Smith. 2014. Etaf: An extended trust antecedents framework for trust prediction. In 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014). IEEE, 540–547.
    [11]
    Wenxing Hong, Hejia Zhang, and Jiacheng Zhu. 2022. FedHD: A privacy-preserving recommendation system with homomorphic encryption and differential privacy. In International Conference on Computer Science and Education. Springer, 581–594.
    [12]
    Dongkun Hou, Jie Zhang, Jieming Ma, Xiaohui Zhu, and Ka Lok Man. 2021. Application of differential privacy for collaborative filtering based recommendation system: A survey. In 2021 12th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). IEEE, 97–101.
    [13]
    Jingyu Hua, Chang Xia, and Sheng Zhong. 2015. Differentially private matrix factorization. In Proceedings of the 24th International Joint Conference on Artificial Intelligence. 1763–1770.
    [14]
    Zach Jorgensen, Ting Yu, and Graham Cormode. 2015. Conservative or liberal? Personalized differential privacy. In 2015 IEEE 31st International Conference on Data Engineering. IEEE, 1023–1034.
    [15]
    Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, and Sungwook Kim. 2018. Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption. ACM Transactions on Privacy and Security (TOPS) 21, 4 (2018), 1–30.
    [16]
    Hyeyoung Ko, Suyeon Lee, Yoonseo Park, and Anna Choi. 2022. A survey of recommendation systems: Recommendation models, techniques, and application fields. Electronics 11, 1 (2022), 141–188.
    [17]
    Samuel Kotz, Tomasz Kozubowski, and Krzysztof Podgórski. 2001. The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance. Number 183. Springer Science & Business Media, Berlin, Germany.
    [18]
    Zhiwei Liu, Liangwei Yang, Ziwei Fan, Hao Peng, and Philip S. Yu. 2022. Federated social recommendation with graph neural network. ACM Transactions on Intelligent Systems and Technology (TIST) 13, 4 (2022), 1–24.
    [19]
    Hao Ma, Dengyong Zhou, Chao Liu, Michael R. Lyu, and Irwin King. 2011. Recommender systems with social regularization. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining. 287–296.
    [20]
    Rachana Mehta and Keyur Rana. 2017. A review on matrix factorization techniques in recommender systems. In 2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA). IEEE, 269–274.
    [21]
    Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang. 2018. Personalized privacy-preserving social recommendation. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 32. 3796–3803.
    [22]
    Natalia Ponomareva, Hussein Hazimeh, Alex Kurakin, Zheng Xu, Carson Denison, H. Brendan McMahan, Sergei Vassilvitskii, Steve Chien, and Abhradeep Guha Thakurta. 2023. How to DP-fy ML: A practical guide to machine learning with differential privacy. Journal of Artificial Intelligence Research 77 (2023), 1113–1201.
    [23]
    Xun Ran, Yong Wang, Leo Yu Zhang, and Jun Ma. 2022. A differentially private matrix factorization based on vector perturbation for recommender system. Neurocomputing 483 (2022), 32–41.
    [24]
    Hyejin Shin, Sungwook Kim, Junbum Shin, and Xiaokui Xiao. 2018. Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Transactions on Knowledge and Data Engineering 30, 9 (2018), 1770–1782.
    [25]
    Jiliang Tang, Huiji Gao, Huan Liu, and Atish Das Sarma. 2012. eTrust: Understanding trust evolution in an online world. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 253–261.
    [26]
    Yong Wang, Mingxing Gao, Xun Ran, Jun Ma, and Leo Yu Zhang. 2023. An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems. Expert Systems with Applications 216 (2023), 119457.
    [27]
    Chuhan Wu, Fangzhao Wu, Yang Cao, Yongfeng Huang, and Xing Xie. 2021. FedGNN: Federated graph neural network for privacy-preserving recommendation. (2021). arXiv:arXiv preprint arXiv:2102.04925
    [28]
    Yilin Xiao, Liang Xiao, Xiaozhen Lu, Hailu Zhang, Shui Yu, and H. Vincent Poor. 2020. Deep-reinforcement-learning-based user profile perturbation for privacy-aware recommendation. IEEE Internet of Things Journal 8, 6 (2020), 4560–4568.
    [29]
    Guangquan Xu, Xinru Ding, Sihan Xu, Yan Jia, Shaoying Liu, Shicheng Feng, and Xi Zheng. 2023. Real-time diagnosis of configuration errors for software of AI server infrastructure. IEEE Transactions on Dependable and Secure Computing (2023).
    [30]
    Guangquan Xu, Zhengbo Han, Lixiao Gong, Litao Jiao, Hongpeng Bai, Shaoying Liu, and Xi Zheng. 2022. ASQ-FastBM3D: An adaptive denoising framework for defending adversarial attacks in machine learning enabled systems. IEEE Transactions on Reliability 72, 1 (2022), 317–328.
    [31]
    Guangquan Xu, Chen Qi, Wenyu Dong, Lixiao Gong, Shaoying Liu, Si Chen, Jian Liu, and Xi Zheng. 2022. A privacy-preserving medical data sharing scheme based on blockchain. IEEE Journal of Biomedical and Health Informatics 27, 2 (2022), 698–709.
    [32]
    Jiaqi Zhai, Jian Liu, and Lusheng Chen. 2021. Extraction security of sequential aggregate signatures. Chinese Journal of Electronics 30, 5 (2021), 885–894.
    [33]
    Shun Zhang, Laixiang Liu, Zhili Chen, and Hong Zhong. 2019. Probabilistic matrix factorization with personalized differential privacy. Knowledge-Based Systems 183 (2019), 104864.
    [34]
    Shu Zhao, Ziwei Du, Jie Chen, Yanping Zhang, Jie Tang, and Philip S. Yu. 2023. Hierarchical representation learning for attributed networks. IEEE Transactions on Knowledge and Data Engineering 35, 3 (2023), 2641–2656.
    [35]
    Shu Zhao, Wenyu Wang, Ziwei Du, Jie Chen, and Zhen Duan. 2023. A black-box adversarial attack method via Nesterov accelerated gradient and rewiring towards attacking graph neural networks. IEEE Transactions on Big Data 9, 6 (2023), 1586–1597.
    [36]
    Hao Zhou, Geng Yang, Yang Xiang, Yunlu Bai, and Weiya Wang. 2021. A lightweight matrix factorization for recommendation with local differential privacy in big data. IEEE Transactions on Big Data 9, 1 (2021), 160–173.
    [37]
    Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, and Ping Xiong. 2013. Differential privacy for neighborhood-based collaborative filtering. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 752–759.
    [38]
    Xue Zhu and Yuqing Sun. 2016. Differential privacy for collaborative filtering recommender algorithm. In Proceedings of the 2016 ACM on International Workshop on Security and Privacy Analytics. 9–16.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data  Volume 18, Issue 7
    August 2024
    505 pages
    ISSN:1556-4681
    EISSN:1556-472X
    DOI:10.1145/3613689
    • Editor:
    • Jian Pei
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 June 2024
    Online AM: 02 January 2024
    Accepted: 15 December 2023
    Revised: 15 September 2023
    Received: 15 September 2023
    Published in TKDD Volume 18, Issue 7

    Check for updates

    Author Tags

    1. Social recommendation
    2. trustworthy artificial intelligence
    3. differential privacy
    4. matrix factorization
    5. Laplace mechanism

    Qualifiers

    • Research-article

    Funding Sources

    • National Science Foundation of China
    • Tianjin Intelligent Manufacturing Special Fund Project
    • China Guangxi Science and Technology Plan Project—Guangxi Science and Technology Base and Talent Special Project
    • Hainan Provincial Natural Science Foundation of China
    • CCF-Nsfocus Kunpeng Fund Project

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 235
      Total Downloads
    • Downloads (Last 12 months)235
    • Downloads (Last 6 weeks)41

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media