Abstract
AbstractRecommender systems have been widely used for implementing personalised content on many mobile online services to reduce computational overload and preserve wireless data for users. The underlying mechanisms used for building recommender systems analyse data collected from users to make recommendations. This poses concerns over the privacy of data from users as both service providers and the cloud will have access. Privacy-preserving recommender systems protect user information by incorporating various cryptographic mechanisms to prevent accessing the data. However, existing works are not practical due to the use of heavy cryptography. In this paper, we propose an efficient privacy-preserving recommender system that takes advantage of clustering to improve efficiency. Using a secure clustering mechanism, user data are assigned to multiple clusters before being fed into the recommendation. Our proposed protocols are privacy-preserving and do not leak information that could be used to identify a data subject. The experiments show that our system is efficient and accurate.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference26 articles.
1. Van den Oord, A., Dieleman, S., & Schrauwen, B. (2013). Deep content-based music recommendation. Advances in Neural Information Processing Systems, 26.
2. Goldberg, D., Nichols, D., Oki, B. M., & Terry, D. (1992). Using collaborative filtering to weave an information tapestry. Communications of the ACM, 35(12), 61–70.
3. Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., & Shmatikov, V. (2011). “You might also like:” Privacy risks of collaborative filtering. In: 2011 IEEE symposium on security and privacy (pp. 231–246). IEEE.
4. Ramakrishnan, N., Keller, B.J., Mirza, B.J., Grama, A.Y., & Karypis, G.(2001). When being weak is brave: Privacy in recommender systems. arXiv:cs/0105028.
5. Canny, J. (2002). Collaborative filtering with privacy. In: Proceedings 2002 IEEE symposium on security and privacy (pp. 45–57). IEEE.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献