skip to main content
10.1145/2361407.2361420acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Privacy-preserving content-based recommender system

Authors Info & Claims
Published:06 September 2012Publication History

ABSTRACT

By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely, also poses a serious privacy risk for the customers: ratings may be very personal or revealing, and thus highly privacy sensitive. Service providers could process the collected rating data for other purposes, sell them to third parties or fail to provide adequate physical security. In this paper, we propose technological mechanisms to protect the privacy of individuals in a recommender system. Our proposal is founded on homomorphic encryption, which is used to obscure the private rating information of the customers from the service provider. While the user's privacy is respected by the service provider, by generating recommendations using encrypted customer ratings, the service provider's commercially valuable item-item similarities are protected against curious entities, in turn. Our proposal explores simple and efficient cryptographic techniques to generate private recommendations using a server-client model, which neither relies on (trusted) third parties, nor requires interaction with peer users. The main strength of our contribution lies in providing a highly efficient solution without resorting to unrealistic assumptions.

References

  1. G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng., 17(6):734--749, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agrawal and R. Srikant. Privacy-preserving data mining. SIGMOD Rec., 29:439--450, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Agrawal, V. Krishnan, and J. Haritsa. On addressing efficiency concerns in privacy-preserving mining. Proc. of 9th Intl. Conf. on Database Systems for Advanced Applications (DASFAA), pages 113--124, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Signal Processing, 2009.Google ScholarGoogle Scholar
  5. J. F. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45--57, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, pages 238--245, New York, NY, USA, 2002. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Cissee and S. Albayrak. An agent-based approach for privacy-preserving recommender systems. In AAMAS '07: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, pages 1--8, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Doraswamy and D. Harkins. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk. Privacy enhanced recommender system. In Thirty-first Symposium on Information Theory in the Benelux, pages 35--42, Rotterdam, 2010.Google ScholarGoogle Scholar
  10. Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk. Efficiently computing private recommendations. In International Conference on Acoustic, Speech and Signal Processing-ICASSP, pages 5864--5867, Prag, Czech Republic, May/2011 2011.Google ScholarGoogle ScholarCross RefCross Ref
  11. Z. Erkin, T. Veugen, and R. L. Lagendijk. Generating private recommendations in a social trust network. In The International Conference on Computational Aspects of Social Networks (CASoN 2011), Salamanca, Spain, 2011. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  12. Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk. Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Transactions on Information Forensics and Security, 2012. to appear.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Fontaine and F. Galand. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. O. Goldreich. Foundations of Cryptography II. Cambridge University Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Indvik. Forrester: E-commerce to reach nearly $300 billion in U.S. by 2015. http://mashable.com/2011/02/28/forrester-e-commerce/, February 28 2011. Online.Google ScholarGoogle Scholar
  16. Y. Lindell and B. Pinkas. Privacy preserving data mining. In Journal of Cryptology, pages 36--54. Springer-Verlag, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. Linden, B. Smith, and J. York. Amazon.com recommendations: item-to-item collaborative filtering. Internet Computing, IEEE, 7(1):76 -- 80, jan/feb 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 627--636, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In J. Stern, editor, Advances in Cryptology -- EUROCRYPT '99, volume 1592 of LNCS, pages 223--238. Springer, May 2-6, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In ICDM, pages 625--628, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Polat and W. Du. SVD-based collaborative filtering with privacy. In SAC '05: Proceedings of the 2005 ACM symposium on Applied computing, pages 791--795, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. N. Ramakrishnan, B. J. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis. Privacy risks in recommender systems. IEEE Internet Computing, 5(6):54--62, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Sarwar, G. Karypis, J. Konstan, and J. Riedl. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th international conference on World Wide Web, WWW '01, pages 285--295, New York, NY, USA, 2001. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux. Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In RecSys '09: Proceedings of the third ACM conference on Recommender systems, pages 157--164, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. R. Troncoso-Pastoriza, S. Katzenbeisser, M. U. Celik, and A. N. Lemma. A secure multidimensional point inclusion protocol. In ACM Workshop on Multimedia and Security, pages 109--120, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Zhang, J. Ford, and F. Makedon. Deriving private information from randomly perturbed ratings. In Proceedings of the Sixth SIAM International Conference on Data Mining, pages 59--69, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy-preserving content-based recommender system

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '12: Proceedings of the on Multimedia and security
      September 2012
      184 pages
      ISBN:9781450314176
      DOI:10.1145/2361407

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 September 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader