Skip to main content

A Secure and Efficient Framework for Privacy Preserving Social Recommendation

  • Conference paper
  • First Online:
Web Technologies and Applications (APWeb 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9313))

Included in the following conference series:

Abstract

The well-known cold start problem in traditional collaborative filtering based recommender systems can be effectively addressed by social recommendation, which has been witnessed by a number of researches recently in many application domains. The social graph used in social recommendation is typically owned by a third party such as Facebook and Twitter, and should be hidden from recommender systems for obvious reasons of commercial benefits, as well as due to privacy legislation. In this paper, we present a secure and efficient framework for privacy preserving social recommendation. Our framework is built on mature cryptographic building blocks, including Paillier cryptosystem and Yao’ protocol, which lays a solid foundation for the security of our framework. Using our framework, the owner of sales data and the owner of social graph can cooperatively compute social recommendation, without revealing their private data to each other. We theoretically prove the security and analyze the complexity of our framework. Empirical study shows our framework has a linear complexity with respect to the number of users and items in recommender systems and is practical in real applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berkhin, P.: Bookmark-coloring algorithm for personalized PageRank. Internet Mathematics 3(1), 41–62 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 4th edn. MIT Press (2009)

    Google Scholar 

  3. Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. IEEE Trans. Information Forensics and Security 7(3), 1053–1066 (2012)

    Article  Google Scholar 

  4. Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. USENIX Security (2011)

    Google Scholar 

  5. Jorgensen, Z., Yu, T.: A privacy-preserving framework for personalized, social recommendations. In: EDBT 2014, pp. 571–582 (2014)

    Google Scholar 

  6. Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1–20. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Konstas, I., Stathopoulos, V., Jose, J.M.: On social networks and collaborative recommendation. In: ACM, pp. 195–202 (2009)

    Google Scholar 

  8. Liu, B., Hengartner, U.: Privacy-preserving social recommendations in geosocial networks. In: IEEE, pp. 69–76. (2013)

    Google Scholar 

  9. Lindell, Y., Pinkas, B.: A Proof of Security of Yao’s Protocol for Two-Party Computation. J. Cryptology 22(2), 161–188 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lü, L., Zhou, T.: Link prediction in complex networks: A survey. Physica A 390(6), 1150–1170 (2011)

    Article  Google Scholar 

  11. McSherry, F., Mironov, I.: Differentially private recommender systems: Building privacy into the Netflix prize contenders. In: KDD 2009, pp. 627–636 (2009)

    Google Scholar 

  12. Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: S&P 2013, pp. 334–348 (2013)

    Google Scholar 

  13. Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-Preserving matrix factorization. In: CCS 2013, pp. 801–812 (2013)

    Google Scholar 

  14. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  15. Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: RecSys 2009, pp. 157–164 (2009)

    Google Scholar 

  16. Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162–167 (1986)

    Google Scholar 

  17. Yuan, Q., Zhao, S., Chen, L., et al.: Augmenting collaborative recommender by fusing explicit social relationships. In: Recsys (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shushu Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, S. et al. (2015). A Secure and Efficient Framework for Privacy Preserving Social Recommendation. In: Cheng, R., Cui, B., Zhang, Z., Cai, R., Xu, J. (eds) Web Technologies and Applications. APWeb 2015. Lecture Notes in Computer Science(), vol 9313. Springer, Cham. https://doi.org/10.1007/978-3-319-25255-1_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25255-1_64

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25254-4

  • Online ISBN: 978-3-319-25255-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics