Abstract
We discuss the issue of privacy protection in collaborative filtering, focusing on the commonly-used memory-based approach. We show that the two main steps in collaborative filtering, being the determination of similarities and the prediction of ratings, can be performed on encrypted profiles, thereby securing the users’ private data. We list a number of variants of the similarity measures and prediction formulas described in literature, and show for each of them how they can be computed using encrypted data only. Although we consider collaborative filtering in this paper, the techniques of comparing profiles using encrypted data only is much wider applicable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aggarwal, C., Wolf, J., Wu, K.-L., Yu, P.: Horting hatches an egg: A new graph-theoretic approach to collaborative filtering. In: Proceedings ACMKDD 1999 Conference, pp. 201–212 (1999)
Breese, J., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. In: Proceedings 14th Conference on Uncertainty in Artificial Intelligence, pp. 43–52 (1998)
Canny, J.: Collaborative filtering with privacy. In: Proceedings IEEE Symposium on Security and Privacy, pp. 45–57 (2002)
Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings ACM SIGIR, pp. 238–245 (2002)
Cohen, J.: Weighted kappa: Nominal scale agreement with provision for scaled disagreement or partial credit. Psychological Bulletin 70, 213–220 (1968)
Fouque, P.-A., Stern, J., Wackers, J.-G.: Cryptocomputing with rationals. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 136–146. Springer, Heidelberg (2003)
Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proceedings ACM SIGIR 1999, pp. 230–237 (1999)
Karypis, G.: Evaluation of item-based top-n recommendation algorithms. In: Proceedings 10th Conference on Information and Knowledge Management, pp. 247–254 (2001)
Nakamura, A., Abe, N.: Collaborative filtering using weighted majority prediction algorithms. In: Proceedings 15th International Conference on Machine Learning, pp. 395–403 (1998)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Analysis of recommendation algorithms for e-commerce. In: Proceedings 2nd ACM Conference on Electronic Commerce, pp. 158–167 (2000)
Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings 10th World Wide Web Conference (WWW10), pp. 285–295 (2001)
Shardanand, U., Maes, P.: Social information filtering: Algorithms for automating word of mouth. In: Proceedings CHI 1995, pp. 210–217 (1995)
van Duijnhoven, A.E.M.: Collaborative filtering with privacy. Master’s thesis, Technische Universiteit Eindhoven (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Verhaegh, W.F.J., van Duijnhoven, A.E.M., Tuyls, P., Korst, J. (2004). Privacy Protection in Memory-Based Collaborative Filtering. In: Markopoulos, P., Eggen, B., Aarts, E., Crowley, J.L. (eds) Ambient Intelligence. EUSAI 2004. Lecture Notes in Computer Science, vol 3295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30473-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-30473-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23721-1
Online ISBN: 978-3-540-30473-9
eBook Packages: Springer Book Archive