Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3055259.3055268acmconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

Privacy-preserving Hybrid Recommender System

Published: 02 April 2017 Publication History

Abstract

Privacy issues in recommender systems have attracted the attention of researchers for many years. So far, a number of solutions have been proposed. Unfortunately, most of them are far from practical as they either downgrade the utility or are very inefficient. In this paper, we aim at a more practical solution, by proposing a privacy-preserving hybrid recommender system which consists of an incremental matrix factorization (IMF) component and a user-based collaborative filtering (UCF) component. The IMF component provides the fundamental utility while it allows the service provider to efficiently learn feature vectors in plaintext domain, and the UCF component improves the utility while allows users to carry out their computations in an offline manner. Leveraging somewhat homomorphic encryption (SWHE) schemes, we provide privacy-preserving candidate instantiations for both components. Our experiments demonstrate that the hybrid solution is much more efficient than existing solutions.

References

[1]
A. Berlioz, A. Friedman, M. A. Kaafar, R. Boreli, and S. Berkovsky. 2015. Applying Differential Privacy to Matrix Factorization. In Proceedings of the 9th ACM Conference on Recommender Systems. 107--114.
[2]
Joppe W Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig. 2013. Improved security for a ring-based fully homomorphic encryption scheme. In Cryptography and Coding. Springer, 45--64.
[3]
Z. Brakerski, C. Gentry, and V. Vaikuntanathan. 2012. (Leveled) Fully Homomorphic Encryption Without Bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. 309--325.
[4]
R. Burke. 2002. Hybrid Recommender Systems: Survey and Experiments. User Modeling and User-Adapted Interaction 12, 4 (2002), 331--370.
[5]
J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. 2011. "You Might Also Like:" Privacy Risks of Collaborative Filtering. In 32nd IEEE Symposium on Security and Privacy, S&P 2011. 231--246.
[6]
J. F. Canny. 2002. Collaborative Filtering with Privacy. In IEEE Symposium on Security and Privacy. 45--57.
[7]
Matthijs J Coster, Antoine Joux, Brian A LaMacchia, Andrew M Odlyzko, Claus-Peter Schnorr, and Jacques Stern. 1992. Improved low-density subset sum algorithms. Computational complexity 2, 2 (1992), 111--128.
[8]
F. K. Dankar and K. El Emam. 2013. Practicing Differential Privacy in Health Care: A Review. Trans. Data Privacy 6, 1 (2013), 35--67.
[9]
C. Gentry. 2009. Fully Homomorphic Encryption Using Ideal Lattices. In Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. 169--178.
[10]
R. Guerraoui, A. Kermarrec, R. Patra, and M. Taziki. 2015. D2P: Distance-based Differential Privacy in Recommenders. Proc. VLDB Endow. 8, 8 (2015), 862--873.
[11]
A. Haeberlen, B. C. Pierce, and A. Narayan. 2011. Differential Privacy Under Fire. In Proceedings of the 20th USENIX Conference on Security. 33--33.
[12]
A. Jeckmans, A. Peter, and P. H. Hartel. 2013. Efficient Privacy-Enhanced Familiarity-Based Recommender System. In Computer Security - ESORICS 2013 (LNCS), Vol. 8134. Springer, 400--417.
[13]
S. Kim, J. Kim, D. Koo, Y. Kim, H. Yoon, and J. Shin. 2016. Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 617--628.
[14]
Microsoft SEAL Library. 2016. https://sealcrypto.codeplex.com/. (2016).
[15]
Z. Liu, Y. X. Wang, and A. Smola. 2015. Fast Differentially Private Matrix Factorization. In Proceedings of the 9th ACM Conference on Recommender Systems. ACM, 171--178.
[16]
F. McSherry and I. Mironov. 2009. Differentially private recommender systems: building privacy into the Netflix prize contenders. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. 627--636.
[17]
Phong Nguyen and Jacques Stern. 1999. The hardness of the hidden subset sum problem and its cryptographic implications. In Advances in Cryptology -- CRYPTO'99. Springer, 31--46.
[18]
V. Nikolaenko, S. Ioannidis, U. Weinsberg, M. Joye, N. Taft, and D. Boneh. 2013. Privacy-preserving Matrix Factorization. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. 801--812.
[19]
Q. Tang and H. Wang. 2016. Privacy-preserving Hybrid Recommender System. Cryptology ePrint Archive: Report 2016/1134. (2016).
[20]
Q. Tang and J. Wang. 2015a. Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. In Computer Security - ESORICS 2015 (LNCS), Vol. 9327. Springer, 101--119.
[21]
Q. Tang and J. Wang. 2015b. Privacy-preserving Friendship-based Recommender Systems. Cryptology ePrint Archive: Report 2015/1152. (2015).
[22]
T. Veugen, R. de Haan, R. Cramer, and F. Muller. 2015. A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations. IEEE Transactions on Information Forensics and Security 10, 3 (2015), 445--457.
[23]
U. Weinsberg, S. Bhagat, S. Ioannidis, and N. Taft. 2012. BlurMe: inferring and obfuscating user gender based on ratings. In Sixth ACM Conference on Recommender Systems. 195--202.

Cited By

View all
  • (2023)A systematic review of privacy techniques in recommendation systemsInternational Journal of Information Security10.1007/s10207-023-00710-122:6(1651-1664)Online publication date: 5-Jun-2023
  • (2023)An Elliptic Curve-Based Privacy-Preserving Recommender SystemIntegrated Uncertainty in Knowledge Modelling and Decision Making10.1007/978-3-031-46781-3_28(334-345)Online publication date: 25-Oct-2023
  • (2021)Privacy-Preserving Matrix Factorization for Cross-Domain RecommendationIEEE Access10.1109/ACCESS.2021.30914269(91027-91037)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. Privacy-preserving Hybrid Recommender System

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SCC '17: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing
    April 2017
    100 pages
    ISBN:9781450349703
    DOI:10.1145/3055259
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. homomorphic encryption
    2. privacy
    3. recommender

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '17
    Sponsor:

    Acceptance Rates

    SCC '17 Paper Acceptance Rate 11 of 27 submissions, 41%;
    Overall Acceptance Rate 64 of 159 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A systematic review of privacy techniques in recommendation systemsInternational Journal of Information Security10.1007/s10207-023-00710-122:6(1651-1664)Online publication date: 5-Jun-2023
    • (2023)An Elliptic Curve-Based Privacy-Preserving Recommender SystemIntegrated Uncertainty in Knowledge Modelling and Decision Making10.1007/978-3-031-46781-3_28(334-345)Online publication date: 25-Oct-2023
    • (2021)Privacy-Preserving Matrix Factorization for Cross-Domain RecommendationIEEE Access10.1109/ACCESS.2021.30914269(91027-91037)Online publication date: 2021
    • (2021)A survey of recommender systems for energy efficiency in buildings: Principles, challenges and prospectsInformation Fusion10.1016/j.inffus.2021.02.002Online publication date: Feb-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media