Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2792838.2800173acmconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
research-article

Applying Differential Privacy to Matrix Factorization

Published: 16 September 2015 Publication History

Abstract

Recommender systems are increasingly becoming an integral part of on-line services. As the recommendations rely on personal user information, there is an inherent loss of privacy resulting from the use of such systems. While several works studied privacy-enhanced neighborhood-based recommendations, little attention has been paid to privacy preserving latent factor models, like those represented by matrix factorization techniques. In this paper, we address the problem of privacy preserving matrix factorization by utilizing differential privacy, a rigorous and provable privacy preserving method. We propose and study several approaches for applying differential privacy to matrix factorization, and evaluate the privacy-accuracy trade-offs offered by each approach. We show that input perturbation yields the best recommendation accuracy, while guaranteeing a solid level of privacy protection.

Supplementary Material

MP4 File (p107.mp4)

References

[1]
S. Berkovsky, T. Kuflik, and F. Ricci. The impact of data obfuscation on the accuracy of collaborative filtering. Expert Syst. Appl., 39(5):5033--5042, 2012.
[2]
J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. "You might also like:" privacy risks of collaborative filtering. In IEEE S&P, pages 231--246, 2011.
[3]
J. Canny. Collaborative filtering with privacy. In IEEE S&P, pages 45--57, 2002.
[4]
K. Chaudhuri, C. Monteleoni, and A. D. Sarwate. Differentially private empirical risk minimization. Journal of Mach. Learn., 12:1069--1109, 2011.
[5]
C. Desrosiers and G. Karypis. A comprehensive survey of neighborhood-based recommendation methods. In Rec. Sys. Handbook, pages 107--144. 2011.
[6]
C. Dwork. Differential privacy: a survey of results. In TAMC, pages 1--19, 2008.
[7]
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TOC, pages 265--284, 2006.
[8]
A. Friedman, B. Knijnenburg, K. Vanhecke, L. Martens, and S. Berkovsky. Privacy aspects of recommender systems. In Rec. Sys. Handbook. 2015.
[9]
M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC, pages 705--714, 2010.
[10]
A. J. Jeckmans, M. Beye, Z. Erkin, P. Hartel, R. L. Lagendijk, and Q. Tang. Privacy in recommender systems. In Social Media Retrieval. 2013.
[11]
A. Kobsa. Privacy-enhanced web personalization. In The Adaptive Web, pages 628--670, 2007.
[12]
Y. Koren, R. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. Computers, 42(8):30--37, Aug. 2009.
[13]
A. Machanavajjhala, A. Korolova, and A. D. Sarma. Personalized social recommendations - accurate or private? PVLDB, 4(7):440--450, 2011.
[14]
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the netflix prize contenders. In KDD, pages 627--636, 2009.
[15]
V. Nikolaenko, S. Ioannidis, U. Weinsberg, M. Joye, N. Taft, and D. Boneh. Privacy-preserving matrix factorization. In CCS, pages 801--812, 2013.
[16]
H. Polat and W. Du. Achieving private recommendations using randomized response techniques. In PAKDD, pages 637--646, 2006.
[17]
D. Vallet, A. Friedman, and S. Berkovsky. Matrix factorization without user data retention. In PAKDD, 2014.
[18]
U. Weinsberg, S. Bhagat, S. Ioannidis, and N. Taft. BlurMe: inferring and obfuscating user gender based on ratings. In RecSys, pages 195--202, 2012.

Cited By

View all
  • (2024)LSH Models in Federated RecommendationApplied Sciences10.3390/app1411442314:11(4423)Online publication date: 23-May-2024
  • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/3652891Online publication date: 13-Apr-2024
  • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/3643821Online publication date: 30-Jan-2024
  • Show More Cited By

Index Terms

  1. Applying Differential Privacy to Matrix Factorization

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      RecSys '15: Proceedings of the 9th ACM Conference on Recommender Systems
      September 2015
      414 pages
      ISBN:9781450336925
      DOI:10.1145/2792838
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 September 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. differential privacy
      2. matrix factorization

      Qualifiers

      • Research-article

      Conference

      RecSys '15
      Sponsor:
      RecSys '15: Ninth ACM Conference on Recommender Systems
      September 16 - 20, 2015
      Vienna, Austria

      Acceptance Rates

      RecSys '15 Paper Acceptance Rate 28 of 131 submissions, 21%;
      Overall Acceptance Rate 254 of 1,295 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)108
      • Downloads (Last 6 weeks)14
      Reflects downloads up to 21 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)LSH Models in Federated RecommendationApplied Sciences10.3390/app1411442314:11(4423)Online publication date: 23-May-2024
      • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/3652891Online publication date: 13-Apr-2024
      • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/3643821Online publication date: 30-Jan-2024
      • (2024)Privacy-Preserving Non-Negative Matrix Factorization with OutliersACM Transactions on Knowledge Discovery from Data10.1145/363296118:3(1-26)Online publication date: 12-Jan-2024
      • (2024)Comprehensive Privacy Analysis on Federated Recommender System Against Attribute Inference AttacksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.329560136:3(987-999)Online publication date: Mar-2024
      • (2024)Federated Matrix Factorization Recommendation Based on Secret Sharing for Privacy PreservingIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.332282411:3(3525-3535)Online publication date: Jun-2024
      • (2024)Marking the Pace: A Blockchain-Enhanced Privacy-Traceable Strategy for Federated Recommender SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.332936311:6(10384-10397)Online publication date: 15-Mar-2024
      • (2024)Privacy-preserving matrix factorization for recommendation systems using Gaussian mechanism and functional mechanismInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02276-315:12(5745-5763)Online publication date: 14-Jul-2024
      • (2024)Federated Conversational Recommender SystemsAdvances in Information Retrieval10.1007/978-3-031-56069-9_4(50-65)Online publication date: 23-Mar-2024
      • (2024)A Multi-behavior Recommendation Algorithm Based on Personalized Federated LearningCollaborative Computing: Networking, Applications and Worksharing10.1007/978-3-031-54531-3_8(134-153)Online publication date: 23-Feb-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media