Skip to main content

GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14492))

  • 136 Accesses

Abstract

As recommender systems have become increasingly popular in providing users with personalized recommendations, researchers have implemented protective measures to safeguard users’ privacy. However, the implementation of such mechanisms is extremely difficult to ensure both recommendation accuracy and privacy protection. In this paper, we propose a novel protective mechanism that addresses this challenge. Our approach introduces the concept of differential trust, which integrates matrix factorization and the combination theorem of differential privacy. We then propose the Gaussian Differential Trust Mechanism, which protects users’ historical ratings while maintaining recommendation accuracy to a certain extent. The rationality of our proposed mechanism is verified by theoretical explanation and experimental evaluation. The experiment results demonstrate that our method effectively balances the competing goals of recommendation accuracy and privacy preservation, providing a solution to the challenges faced by recommender systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    From a website where we can download the data set directly. (http://trust.mindswap.org/FilmTrust).

  2. 2.

    From an anonymized Douban dataset. Two files are included in this Douban dataset, the user-item rating file and the user social friend network file. (https://www.cse.cuhk.edu.hk/irwin.king.new/pub/data/douban).

References

  1. Gao, R., Shah, C.: Counteracting bias and increasing fairness in search and recommender systems. In: Proceedings of the 14th ACM Conference on Recommender Systems, pp. 745–747 (2020)

    Google Scholar 

  2. Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Priv. Secur. (TOPS) 21(1), 1–30 (2018)

    Article  Google Scholar 

  3. Xu, G., et al.: Soprotector: safeguard privacy for native so files in evolving mobile IoT applications. IEEE Internet Things J. 7(4), 2539–2552 (2020). https://doi.org/10.1109/JIOT.2019.2944006

    Article  Google Scholar 

  4. Pei, F., He, Y.W., Yan, A., Zhou, M., Chen, Y.W., Wu, J.: A consensus model for intuitionistic fuzzy group decision-making problems based on the construction and propagation of trust/distrust relationships in social networks. Int. J. Fuzzy Syst. 22, 2664–2679 (2020)

    Article  Google Scholar 

  5. Ouaddah, A., Mousannif, H., Abou Elkalam, A., Ouahman, A.A.: Access control in the internet of things: big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017)

    Article  Google Scholar 

  6. Zhang, Q., Lu, J., Jin, Y.: Artificial intelligence in recommender systems. Complex Intell. Syst. 7, 439–457 (2021)

    Article  Google Scholar 

  7. Ozsoy, M.G., Polat, F.: Trust based recommendation systems. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1267–1274 (2013)

    Google Scholar 

  8. Ma, H., Yang, H., Lyu, M.R., King, I.: Sorec: social recommendation using probabilistic matrix factorization. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 931–940 (2008)

    Google Scholar 

  9. Ma, H., King, I., Lyu, M.R.: Learning to recommend with social trust ensemble. In: Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 203–210 (2009)

    Google Scholar 

  10. Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I.: Recommender systems with social regularization. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, pp. 287–296 (2011)

    Google Scholar 

  11. Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the Fourth ACM Conference on Recommender Systems, pp. 135–142 (2010)

    Google Scholar 

  12. Zhang, C., Yu, L., Wang, Y., Shah, C., Zhang, X.: Collaborative user network embedding for social recommender systems. In: Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 381–389. SIAM (2017)

    Google Scholar 

  13. Guo, G., Zhang, J., Yorke-Smith, N.: TrustSVD: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 29 (2015)

    Google Scholar 

  14. Xu, X., Yuan, D.: A novel matrix factorization recommendation algorithm fusing social trust and behaviors in micro-blogs. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 283–287. IEEE (2017)

    Google Scholar 

  15. Hu, Z., et al.: SSL-SVD: semi-supervised learning-based sparse trust recommendation. ACM Trans. Internet Technol. (TOIT) 20(1), 1–20 (2020)

    Article  Google Scholar 

  16. Huang, W., Liu, B., Tang, H.: Privacy protection for recommendation system: a survey. In: Journal of Physics: Conference Series, vol. 1325, p. 012087. IOP Publishing (2019)

    Google Scholar 

  17. Friedman, A., Berkovsky, S., Kaafar, M.A.: A differential privacy framework for matrix factorization recommender systems. User Model. User-Adap. Inter. 26, 425–458 (2016)

    Article  Google Scholar 

  18. Shin, H., Kim, S., Shin, J., Xiao, X.: Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Trans. Knowl. Data Eng. 30(9), 1770–1782 (2018). https://doi.org/10.1109/TKDE.2018.2805356

    Article  Google Scholar 

  19. Zhang, S., Liu, L., Chen, Z., Zhong, H.: Probabilistic matrix factorization with personalized differential privacy. Knowl.-Based Syst. 183, 104864 (2019)

    Article  Google Scholar 

  20. Zhou, H., Yang, G., Xiang, Y., Bai, Y., Wang, W.: A lightweight matrix factorization for recommendation with local differential privacy in big data. IEEE Trans. Big Data 9(1), 160–173 (2023). https://doi.org/10.1109/TBDATA.2021.3139125

    Article  Google Scholar 

  21. Xu, G., et al.: TT-SVD: an efficient sparse decision-making model with two-way trust recommendation in the AI-enabled IoT systems. IEEE Internet Things J. 8(12), 9559–9567 (2020)

    Article  Google Scholar 

  22. Wang, F., Zhu, H., Srivastava, G., Li, S., Khosravi, M.R., Qi, L.: Robust collaborative filtering recommendation with user-item-trust records. IEEE Trans. Comput. Soc. Syst. 9(4), 986–996 (2021)

    Article  Google Scholar 

  23. Fang, H., Guo, G., Zhang, J.: Multi-faceted trust and distrust prediction for recommender systems. Decis. Support Syst. 71, 37–47 (2015)

    Article  Google Scholar 

  24. Nie, P., Xu, G., Jiao, L., Liu, S., Liu, J., Meng, W., Wu, H., Feng, M., Wang, W., Jing, Z., et al.: Sparse trust data mining. IEEE Trans. Inf. Forensics Secur. 16, 4559–4573 (2021)

    Article  Google Scholar 

  25. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12), 94–101 (2009)

    Article  Google Scholar 

  26. Koren, Y.: Factor in the neighbors: scalable and accurate collaborative filtering. ACM Trans. Knowl. Discov. Data (TKDD) 4(1), 1–24 (2010)

    Article  MathSciNet  Google Scholar 

  27. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318 (2016)

    Google Scholar 

  28. Funk, S.: Netflix update: try this at home (2006)

    Google Scholar 

  29. Mnih, A., Salakhutdinov, R.R.: Probabilistic matrix factorization. In: Advances in Neural Information Processing Systems, vol. 20 (2007)

    Google Scholar 

Download references

Acknowledgements

This work is supported in part by the National Key RD Program of China under No. 2022YFB3102100, the National Science Foundation of China under Grants U22B2027, 62172297 and 61902276, the Key Research and Development Project of Sichuan Province under Grant 2021YFSY0012, Tianjin Intelligent Manufacturing Special Fund Project under Grants 20211097, and Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies under No. 2022B1212010005.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingyi Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gong, L. et al. (2024). GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14492. Springer, Singapore. https://doi.org/10.1007/978-981-97-0811-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0811-6_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0810-9

  • Online ISBN: 978-981-97-0811-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics