Abstract
In our connected world, recommender services have become widely known for their ability to provide expert and personalize information to participants of diverse applications. The excessive growth of social networks, a new kind of services are being embraced which are termed as “group based recommendation services”, where recommender services can be utilized to discover sub-communities within implicit social groups and provide referrals to new participants in order to join various sub-communities of other participants who share similar preferences or interests. Nevertheless, protecting participants’ privacy in recommendation services is a quite crucial aspect which might prevent participants from exchanging their own data with these services, which in turn detain the accuracy of the generated referrals. So in order to gain accurate referrals, recommendation services should have the ability to discover previously unknown sub-communities from different social groups in a way to preserve privacy of participants in each group. In this paper, we present a middleware that runs on end-users’ mobile phones to sanitize their profiles’ data when released for generating referrals, such that computation of referrals continues over the sanitized version of their profiles’ data. The proposed middleware is equipped with cryptography protocols to facilitate private discovery of sub-communities from the sanitized version of participants’ profiles in a university scenario. Location data are added to participants’ profiles to improve the awareness of surrounding sub-communities, so the offered referrals can be filtered based on adjacent locations for participant’s location. We performed a number of different experiments to test the efficiency and accuracy of our protocols. We also developed a formal model for the tradeoff between privacy level and accuracy of referrals. As supported by the experiments, the sub-communities were correctly identified with good accuracy and an acceptable privacy level.











Similar content being viewed by others
References
Taylor D et al (2009) Privacy concern and online personalization: the moderating effects of information control and compensation. Electron Commer Res 9:203–223
Yang CC et al (2003) Visualization of large category map for Internet browsing. Decis Support Syst 35:89–102
Petrova K, Wang B (2011) Location-based services deployment and demand: a roadmap model. Electron Commer Res 11:5–29
Xu F et al (2013) Factors affecting privacy disclosure on social network sites: an integrated model. Electron Commer Res 13:1–18
Smith R, Shao J (2007) Privacy and e-commerce: a consumer-centric perspective. Electron Commer Res 7:89–116
Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, New York
He J et al (2006) Inferring privacy information from social networks. In: Presented at the proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, San Diego, CA
Cockcroft SKS, Clutterbuck PJ (2001) Attitudes towards information privacy. ACIS 2001 Proceedings, 20 pp
de Gemmis M et al (2009) Preference learning in recommender systems. In: Presented at the European conference on machine learning and principles and practice of knowledge discovery in databases (ECML/PKDD), Slovenia
McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. In: Presented at the proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France
Koutsabasis P et al (2008) A descriptive reference framework for the personalisation of e-business applications. Electron Commer Res 8:173–192
Esma A (2008) Experimental demonstration of a hybrid privacy-preserving recommender system, pp 161–170
Loureiro S et al (2001) Secure data collection with updates. Electron Commer Res 1:119–130
Canny J (2002) Collaborative filtering with privacy via factor analysis. In: Presented at the proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval, Tampere, Finland
Canny J (2002) Collaborative filtering with privacy. In: Presented at the proceedings of the 2002 IEEE symposium on security and privacy
Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Presented at the proceedings of the third IEEE international conference on data mining
Polat H, Du W (2005) SVD-based collaborative filtering with privacy. In: Presented at the proceedings of the 2005 ACM symposium on applied computing, Santa Fe, New Mexico
Huang Z et al (2005) Deriving private information from randomized data. In: Presented at the proceedings of the 2005 ACM SIGMOD international conference on management of data, Baltimore, Maryland
Kargupta H et al (2003) On the privacy preserving properties of random data perturbation techniques. In: Presented at the proceedings of the third IEEE international conference on data mining
Miller BN et al (2004) PocketLens: toward a personal recommender system. ACM Trans Inf Syst 22:437–476
Swamynathan G et al (2010) The design of a reliable reputation system. Electron Commer Res 10:239–270
Elmisery A, Botvich D (2013) Multi-agent based middleware for protecting privacy in IPTV content recommender services. Multimedia Tools Appl 64(2):249–275. doi:10.1007/s11042-012-1067-3
Elmisery A, Botvich D (2012) Privacy aware recommender service using multi-agent middleware—an IPTV network scenario. Informatica 36(1):21–36
Elmisery A, Botvich D (2011) Enhanced middleware for collaborative privacy in IPTV recommender services. J Converg 2:10
Elmisery A, Botvich D (2011) An agent based middleware for privacy aware recommender systems in IPTV networks. In: 3rd international conference on intelligent decision technologies, University of Piraeus, Greece
Elmisery A, Botvich D (2011) Agent based middleware for maintaining user privacy in IPTV recommender services. In: 3rd international ICST conference on security and privacy in mobile information and communication systems, Aalborg, Denmark
Elmisery A, Botvich D (2011) Privacy aware recommender service for IPTV networks. In: 5th FTRA/IEEE international conference on multimedia and ubiquitous rngineering, Crete, Greece
Elmisery AM et al (2012) Privacy aware community based recommender service for conferences attendees. In: 16th international conference on knowledge-based and intelligent information and engineering systems, San Sebastian, Spain, pp 519–531
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Jacques Stern (ed) Proceedings of the 17th international conference on Theory and application of cryptographic techniques (EUROCRYPT’99), Springer, Berlin, Heidelberg, pp 223–238
Li J, Pendry JB (2008) Hiding under the carpet: a new strategy for cloaking. http://arxiv.org/abs/0806.4396
Ram J et al (2007) A secure multidimensional point inclusion protocol. In: Presented at the proceedings of the 9th workshop on multimedia and security, Dallas, Texas, USA
Thomas T (2007) A secure multidimensional point inclusion protocol, CoRR, pp 109–120
Ankerst M et al (1999) OPTICS: ordering points to identify the clustering structure. In: Presented at the proceedings of the 1999 ACM SIGMOD international conference on management of data, Philadelphia, Pennsylvania, United States
Metzler D et al (2007) Similarity measures for short segments of text. In: Presented at the proceedings of the 29th European conference on IR research, Rome, Italy
Cuesta-Frau D et al (2003) Clustering of electrocardiograph signals in computer-aided Holter analysis. Comput Methods Programs Biomed 72:179–196
Acknowledgments
This work was partially financed by the Knowledge Foundation through the Internet of Things and People research profile (Malmö University, Sweden), by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2061978).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Elmisery, A.M., Rho, S. & Botvich, D. Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups. J Supercomput 72, 247–274 (2016). https://doi.org/10.1007/s11227-015-1574-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1574-x