ABSTRACT
By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely, also poses a serious privacy risk for the customers: ratings may be very personal or revealing, and thus highly privacy sensitive. Service providers could process the collected rating data for other purposes, sell them to third parties or fail to provide adequate physical security. In this paper, we propose technological mechanisms to protect the privacy of individuals in a recommender system. Our proposal is founded on homomorphic encryption, which is used to obscure the private rating information of the customers from the service provider. While the user's privacy is respected by the service provider, by generating recommendations using encrypted customer ratings, the service provider's commercially valuable item-item similarities are protected against curious entities, in turn. Our proposal explores simple and efficient cryptographic techniques to generate private recommendations using a server-client model, which neither relies on (trusted) third parties, nor requires interaction with peer users. The main strength of our contribution lies in providing a highly efficient solution without resorting to unrealistic assumptions.
- G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng., 17(6):734--749, 2005. Google ScholarDigital Library
- R. Agrawal and R. Srikant. Privacy-preserving data mining. SIGMOD Rec., 29:439--450, May 2000. Google ScholarDigital Library
- S. Agrawal, V. Krishnan, and J. Haritsa. On addressing efficiency concerns in privacy-preserving mining. Proc. of 9th Intl. Conf. on Database Systems for Advanced Applications (DASFAA), pages 113--124, 2004.Google ScholarCross Ref
- T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Signal Processing, 2009.Google Scholar
- J. F. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45--57, 2002. Google ScholarDigital Library
- J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, pages 238--245, New York, NY, USA, 2002. ACM Press. Google ScholarDigital Library
- R. Cissee and S. Albayrak. An agent-based approach for privacy-preserving recommender systems. In AAMAS '07: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, pages 1--8, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- N. Doraswamy and D. Harkins. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1999. Google ScholarDigital Library
- Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk. Privacy enhanced recommender system. In Thirty-first Symposium on Information Theory in the Benelux, pages 35--42, Rotterdam, 2010.Google Scholar
- Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk. Efficiently computing private recommendations. In International Conference on Acoustic, Speech and Signal Processing-ICASSP, pages 5864--5867, Prag, Czech Republic, May/2011 2011.Google ScholarCross Ref
- Z. Erkin, T. Veugen, and R. L. Lagendijk. Generating private recommendations in a social trust network. In The International Conference on Computational Aspects of Social Networks (CASoN 2011), Salamanca, Spain, 2011. IEEE.Google ScholarCross Ref
- Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk. Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Transactions on Information Forensics and Security, 2012. to appear.Google ScholarDigital Library
- C. Fontaine and F. Galand. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 2007. Google ScholarDigital Library
- O. Goldreich. Foundations of Cryptography II. Cambridge University Press, 2004. Google ScholarDigital Library
- L. Indvik. Forrester: E-commerce to reach nearly $300 billion in U.S. by 2015. http://mashable.com/2011/02/28/forrester-e-commerce/, February 28 2011. Online.Google Scholar
- Y. Lindell and B. Pinkas. Privacy preserving data mining. In Journal of Cryptology, pages 36--54. Springer-Verlag, 2000. Google ScholarDigital Library
- G. Linden, B. Smith, and J. York. Amazon.com recommendations: item-to-item collaborative filtering. Internet Computing, IEEE, 7(1):76 -- 80, jan/feb 2003. Google ScholarDigital Library
- F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 627--636, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In J. Stern, editor, Advances in Cryptology -- EUROCRYPT '99, volume 1592 of LNCS, pages 223--238. Springer, May 2-6, 1999. Google ScholarDigital Library
- H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In ICDM, pages 625--628, 2003. Google ScholarDigital Library
- H. Polat and W. Du. SVD-based collaborative filtering with privacy. In SAC '05: Proceedings of the 2005 ACM symposium on Applied computing, pages 791--795, New York, NY, USA, 2005. ACM Press. Google ScholarDigital Library
- N. Ramakrishnan, B. J. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis. Privacy risks in recommender systems. IEEE Internet Computing, 5(6):54--62, 2001. Google ScholarDigital Library
- B. Sarwar, G. Karypis, J. Konstan, and J. Riedl. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th international conference on World Wide Web, WWW '01, pages 285--295, New York, NY, USA, 2001. ACM. Google ScholarDigital Library
- R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux. Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In RecSys '09: Proceedings of the third ACM conference on Recommender systems, pages 157--164, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- J. R. Troncoso-Pastoriza, S. Katzenbeisser, M. U. Celik, and A. N. Lemma. A secure multidimensional point inclusion protocol. In ACM Workshop on Multimedia and Security, pages 109--120, 2007. Google ScholarDigital Library
- S. Zhang, J. Ford, and F. Makedon. Deriving private information from randomly perturbed ratings. In Proceedings of the Sixth SIAM International Conference on Data Mining, pages 59--69, 2006.Google ScholarCross Ref
Index Terms
- Privacy-preserving content-based recommender system
Recommendations
Privacy-preserving recommendation system based on user classification
AbstractRecommender systems have become ubiquitous in many application domains such as e-commerce and entertainment to recommend items that are interesting to the users. Collaborative Filtering is one of the most widely known techniques for implementing ...
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements
Information Systems SecurityAbstractSafeguarding privacy of ratings assigned by users is an important issue for recommender systems. There are several existing protocols that allow a server to generate recommendations from homomorphically encrypted ratings, thereby ensuring privacy ...
Trust-aware Privacy-Preserving Recommender System
MobiMedia '16: Proceedings of the 9th EAI International Conference on Mobile Multimedia CommunicationsRecommender systems have achieved great success in providing product recommendations for online shopping. With recommender systems, customers can find their interested merchandise in a timely manner. It not only facilitates customers' purchases, but ...
Comments