Skip to main content
Log in

An efficient and secure recommendation system based on federated matrix factorization in digital economy

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

The recommendation system is widely used in the digital economy to establish relationship between users and products. However, the data is usually scattered in different organizations in the form of “data islands” to protect privacy. To solve the above problem, we proposed an efficient and secure recommendation system based on federated matrix factorization, in which every user trains the model locally with their own data and uploads the calculated gradient vector instead of the original data. In the scheme, one server verifies the aggregation results transmitted by other servers and completes the model update without revealing user privacy. Additionally, users are allowed to drop out during the training process, and each participant’s behavior will be recorded to calculate the rewards or punishments. Finally, we evaluated the performance from different perspectives and proved its feasibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Ammad-Ud-Din M, Ivannikova E, Khan SA, Oyomno W, Fu Q, Tan KE, Flanagan A (2019) Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv:1901.09888

  2. Berlioz A, Friedman A, Kaafar MA, Boreli R, Berkovsky S (2015) Applying differential privacy to matrix factorization. In: Proceedings of the 9th ACM conference on recommender systems, pp 107–114

  3. Blum M, Micali S (1984) How to generate cryptographically strong sequences of pseudorandom bits. SIAM J Comput 13(4):850–864

    Article  MathSciNet  MATH  Google Scholar 

  4. Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 1175–1191

  5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference. Springer, pp 213–229

  6. Bottou Léon (2010) Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT’2010. Springer, pp 177–186

  7. Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory 6(3):13:1–13:36

    Article  MathSciNet  MATH  Google Scholar 

  8. Campana MG, Delmastro F (2017) Recommender systems for online and mobile social networks: a survey. Online Social Networks and Media 3:75–97

    Article  Google Scholar 

  9. Chai D, Wang L, Chen K, Yang Q (2020) Secure federated matrix factorization. IEEE Intelligent Systems

  10. Davidson J, Liebald B, Liu J, Nandy P, Vleet TV, Gargi U, Gupta S, He Y, Lambert M, Livingston B, et al. (2010) The youtube video recommendation system. In: Proceedings of the fourth ACM conference on recommender systems, pp 293–296

  11. Debnath S, Ganguly N, Mitra P (2008) Feature weighting in content based recommendation system using social network analysis. In: Proceedings of the 17th international conference on World Wide Web, pp 1041–1042

  12. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22 (6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  13. Farashahi RR, Schoenmakers B, Sidorenko A (2007) Efficient pseudorandom generators based on the ddh assumption. In: International workshop on public key cryptography. Springer, pp 426–441

  14. Fiore D, Gennaro R, Pastro V (2014) Efficiently verifiable computation on encrypted data. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 844–855

  15. Guo J, Li C, Zhang G, Sun Y, Bie R (2019) Blockchain-enabled digital rights management for multimedia resources of online education. Multimed Tools Appl 79(15-16):9735–9755

    Article  Google Scholar 

  16. Harper FM, Konstan JA (2015) The movielens datasets: history and context. ACM Trans Interact Intell Syst (tiis) 5(4):1–19

    Google Scholar 

  17. Hu C, Cheng X, Tian Z, Yu J, Lv W (2021) Achieving privacy preservation and billing via delayed information release. IEEE/ACM Trans Netw 29(3):1376–1390

    Article  Google Scholar 

  18. Jalalirad A, Scavuzzo M, Capota C, Sprague M (2019) A simple and efficient federated recommender system. In: Proceedings of the 6th IEEE/ACM international conference on big data computing, applications and technologies, pp 53–58

  19. Kairouz P, McMahan HB, Avent B, Bellet Aurélien, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R, et al. (2019) Advances and open problems in federated learning

  20. Kim S, Kim J, Koo D, Kim Y, Yoon H, Shin J (2016) Efficient privacy-preserving matrix factorization via fully homomorphic encryption. In: Proceedings of the 11th ACM on Asia conference on computer and communications security, pp 617–628

  21. Koren Y, Bell R, Volinsky C (2009) Matrix factorization techniques for recommender systems. Computer 42(8):30–37

    Article  Google Scholar 

  22. Li H, Liu D, Dai Y, Luan TH (2015) Engineering searchable encryption of mobile cloud networks: when qoe meets qop. IEEE Wireless Communications 22(4):74–80

    Article  Google Scholar 

  23. Li H, Liu D, Dai Y, Luan TH, Shen XS (2014) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3(1):127–138

    Article  Google Scholar 

  24. Li T, Song L, Fragouli C (2020) Federated recommendation system via differential privacy. In: IEEE international symposium on information theory, ISIT 2020, Los Angeles, CA, USA, June 21-26, 2020. IEEE, pp 2592–2597

  25. McDonald DW, Ackerman MS (2000) Expertise recommender: a flexible recommendation system and architecture. In: Proceedings of the 2000 ACM conference on computer supported cooperative work, pp 231–240

  26. McMahan B, Moore E, Ramage D, Hampson S, Agüera y Arcas B (2017) Communication-efficient learning of deep networks from decentralized data. In: Singh A, Zhu X (Jerry) (eds) Proceedings of the 20th international conference on artificial intelligence and statistics, AISTATS 2017, 20-22 April 2017, Fort Lauderdale, FL, USA, volume 54 of Proceedings of Machine Learning Research. PMLR, pp 1273–1282

  27. McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the netflix prize contenders. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 627–636

  28. Muhammad K, Wang Q, O’Reilly-Morgan D, Tragos EZ, Smyth B, Hurley N, Geraci J, Lawlor A (2020) Fedfast: going beyond average for faster training of federated recommender systems. In: Gupta R, Liu Y, Tang J, Prakash BA (eds) KDD ’20: the 26th ACM SIGKDD conference on knowledge discovery and data mining, virtual event, CA, USA, August 23-27, 2020, pages 1234–1242. ACM

  29. Nichol A, Achiam J, Schulman J (2018) On first-order meta-learning algorithms. arXiv:1803.02999

  30. Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N, Boneh D (2013) Privacy-preserving matrix factorization. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 801–812

  31. Osvik DA, Bos JW, Stefan D, Canright D (2010) Fast software aes encryption. In: International workshop on fast software encryption. Springer, pp 75–93

  32. Ozturk A, Polat H (2015) From existing trends to future trends in privacy-preserving collaborative filtering. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 5(6):276–291

    Google Scholar 

  33. Pazzani MJ, Billsus D (2007) Content-based recommendation systems. In: The adaptive web. Springer, pp 325–341

  34. Pu Y, Hu C, Deng S, Alrawais A (2020) R2PEDS: a recoverable and revocable privacy-preserving edge data sharing scheme. IEEE Internet of Things Journal 7(9):8077–8089

    Article  Google Scholar 

  35. Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Information Sciences 540:308–324

    Article  MathSciNet  Google Scholar 

  36. Schafer JB, Frankowski D, Herlocker J, Sen S (2007) Collaborative filtering recommender systems. In: The adaptive web. Springer, pp 291–324

  37. Shamir A (1979) How to share a secret. Communications of the ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  38. Sun Y, Fang M, Wang X (2018) A novel stock recommendation system using guba sentiment analysis. Personal and Ubiquitous Computing 22(3):575–587

    Article  Google Scholar 

  39. Sun Y, Zhang J, Bie R, Yu J (2018) Advancing researches on iot systems and intelligent applications. Personal and Ubiquitous Computing 22(3):449–452

    Article  Google Scholar 

  40. Takane Y, Young FW, Leeuw JD (1977) Nonmetric individual differences multidimensional scaling: an alternating least squares method with optimal scaling features. Psychometrika 42(1):7–67

    Article  MATH  Google Scholar 

  41. Wei J, He J, Chen K, Zhou Y, Tang Z (2017) Collaborative filtering and deep learning based recommendation system for cold start items. Expert Systems with Applications 69:29–39

    Article  Google Scholar 

  42. Wu C, Wu F, Cao Y, Huang Y, Xie X (2021) Fedgnn: federated graph neural network for privacy-preserving recommendation. arXiv:2102.04925

  43. Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2):1–19

    Article  Google Scholar 

Download references

Funding

This work was supported in part by the National Key Research and Development Project under Grant 2018YFC0831800; in part by the National Natural Science Foundation of China under grants 62072065 and 61932006; in part by Key Project of Technology Innovation and Application Development of Chongqing (cstc2019jscx-mbdxX0044, cstc2019jscx-mbdxX0064, cstc2019jscx-mbdxX0020) and Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing(cx201 8015,cx2020004).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Chunlei Fu or Chunqiang Hu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, H., Fu, C. & Hu, C. An efficient and secure recommendation system based on federated matrix factorization in digital economy. Pers Ubiquit Comput 27, 1595–1606 (2023). https://doi.org/10.1007/s00779-021-01646-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-021-01646-w

Keywords

Navigation