Privacy-Preserving Friendship-Based Recommender Systems

被引:21
作者
Tang, Qiang [1 ]
Wang, Jun [1 ]
机构
[1] Univ Luxembourg, SnT, L-4365 Luxembourg, Luxembourg
关键词
Recommender system; privacy; homomorphic encryption; FULLY HOMOMORPHIC ENCRYPTION; SECURITY;
D O I
10.1109/TDSC.2016.2631533
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving recommender systems have been an active research topic for many years. However, until today, it is still a challenge to design an efficient solution without involving a fully trusted third party or multiple semi-trusted third parties. The key obstacle is the large underlying user populations (i.e., huge input size) in the systems. In this paper, we revisit the concept of friendship-based recommender systems, proposed by Jeckmans et al. and Tang and Wang. These solutions are very promising because recommendations are computed based on inputs from a very small subset of the overall user population (precisely, a user's friends and some randomly chosen strangers). We first clarify the single prediction protocol and Top-n protocol by Tang and Wang, by correcting some flaws and improving the efficiency of the single prediction protocol. We then design a decentralized single protocol by getting rid of the semi-honest service provider. In order to validate the designed protocols, we crawl Twitter and construct two datasets (FMT and 10-FMT) which are equipped with auxiliary friendship information. Based on 10-FMT and MovieLens 100k dataset with simulated friendships, we show that even if our protocols use a very small subset of the datasets, their accuracy can still be equal to or better than some baseline algorithm. Based on these datasets, we further demonstrate that the outputs of our protocols leak very small amount of information of the inputs, and the leakage decreases when the input size increases. We finally show that he single prediction protocol is quite efficient but the Top-n is not. However, we observe that the efficiency of the Top-n protocol can be dramatically improved if we slightly relax the desired security guarantee.
引用
收藏
页码:784 / 796
页数:13
相关论文
共 30 条
[1]   ALAMBIC:: a privacy-preserving recommender system for electronic commerce [J].
Aimeur, Esma ;
Brassard, Gilles ;
Fernandez, Jose M. ;
Onana, Flavien Serge Mani .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (05) :307-334
[2]  
[Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security
[3]  
Backstrom L, 2012, PROCEEDINGS OF THE 3RD ANNUAL ACM WEB SCIENCE CONFERENCE, 2012, P33
[4]  
Berlioz A., 2015, P 9 ACM C REC SYST R, P107, DOI DOI 10.1145/2792838.2800173
[5]  
Beye M., 2013, SOCIAL MEDIA RETRIEV, P263
[6]  
Bhaskar R, 2011, LECT NOTES COMPUT SC, V7073, P215, DOI 10.1007/978-3-642-25385-0_12
[7]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[8]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[9]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[10]   "You Might Also Like:" Privacy Risks of Collaborative Filtering [J].
Calandrino, Joseph A. ;
Kilzer, Ann ;
Narayanan, Arvind ;
Felten, Edward W. ;
Shmatikov, Vitaly .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :231-246