Abstract
In order to receive efficient personalized recommendation, users have to provide personal information to service providers. However, in this process, personal private data are in an extremely dangerous situation. Personalized recommendation technology based on privacy protection can enable users to enjoy personalized recommendations, while private data are also protected. In this paper, an efficient privacy-preserving collaborative filtering algorithm is proposed, which is based on differential privacy protection and time factor. The proposed method used the MovieLens data set in the experiment. Experimental results showed that the proposed method can effectively protect the private data, but the accuracy of recommendation is slightly inferior than the traditional collaborative filtering algorithm.
Similar content being viewed by others
References
Tang L, Jiang Y, Li L et al (2015) Personalized recommendation via parameter-free contextual bandits. In: International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, pp 323–332
Blum A, Dwork C, McSherry F et al (2005) Practical privacy: the Su LQ framework. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM, pp 128–138
Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, pp 493–502
Mohammed N, Chen R (2011) Differentially private data release for data mining. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, pp 493–501
Moreno MN, García FJ, Polo MJ et al (2004) Using association analysis of web data in recommender systems. In: International Conference on E-Commerce and Web Technology, pp 11–20
Sun X, Kong F, Chen H (2005) Using quantitative association rules in collaborative filtering. In: International Conference on Advances in Web-Age Information Management. Springer, pp 822–827
Chun J, Oh JY, Kwon S et al (2004) Simulating the effectiveness of using association rules for recommendation systems. In: Asian Simulation Conference on Systems Modeling and Simulation: Theory and Applications. Springer, Berlin, pp 306–314
Li J, Tang B, Cercone N (2004) Applying association rules for interesting recommendations using rule templates. In: Advances in Knowledge Discovery and Data Mining. Springer, Berlin, pp 166–170
Yin C, Feng L, Ma L (2016) An improved Hoeffding-ID data-stream classification algorithm. J Supercomput 72(7):2670–2681
Mooney RJ, Bennett PN, Roy L (2017) Book recommending using text categorization with extracted information. In: Recommender Systems Papers from Workshop 2017, pp 49–54
Pazzani M, Billsus D (1997) Learning and revising user profiles: the identification of interesting web sites. Mach Learn 27(3):313–331
Salem B, Rauterberg M (2004) Multiple user profile merging (MUPE): key challenges for environment awareness. In: European Symposium on Ambient Intelligence 2004, pp 196–206
Sparacino F (2003) Sto(ry)chastics: a Bayesian network architecture for user modeling and computational storytelling for interactive spaces. In: UBICOMP 2003: Ubiquitous Computing. Springer, Berlin, pp 54–72
McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, pp 627–636
Machanavajjhala A, Korolova A, Sarma AD (2011) Personalized social recommendations: accurate or private. Proc VLDB Endow 4(7):440–450
Shen Y, Jin H (2014) Privacy-preserving personalized recommendation: an instance-based approach via differential privacy. In: IEEE International Conference on Data Mining 2014, pp 540–549
Jin H, Jin H (2016) EpicRec: towards practical differentially private framework for personalized recommendation. In: ACM Sigsac Conference on Computer and Communications Security. ACM, pp 180–191
Huang J, Qi J, Xu Y, Chen J (2015) A privacy-enhancing model for location-based personalized recommendations. Distrib Parallel Databases 33(2):253–276
Ahmed KW, Mouri IJ, Zaman R et al (2016) A privacy preserving personalized group recommendation framework. In: International Conference on Advanced Computing. IEEE, pp 594–598
Dwork C (2008) Differential privacy: a survey of results. In: International Conference on Theory and Applications of MODELS of Computation. Springer, pp 1–19
Clifton C, Tassa T (2013) On syntactic anonymity and differential privacy. In: 29th International Conference on. IEEE, pp 88–93
Yin C, Xi J, Sun R, Wang J (2018) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things. IEEE Trans Ind Inf 14(8):3628–3636
Kumari V, Chakravarthy S (2016) Cooperative privacy game: a novel strategy for preserving privacy in data publishing. Hum Centric Comput Inf Sci 6(1):12
Boutet A, Frey D, Guerraoui R, Jégou A, Kermarrec AM (2016) Privacy-preserving distributed collaborative filtering. Computing 98(8):827–846
Chai T, Draxler RR (2014) Root mean square error (RMSE) or mean absolute error (MAE)?–arguments against avoiding RMSE in the literature. Geosci Model Dev 7(3):1247–1250
Yin C, Zhang S (2017) Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimed Tools Appl 76(16):16911–16927
Yin C, Xia L, Zhang S, Sun R, Wang J (2017) Improved clustering algorithm based on high-speed network data stream. Soft Comput 22(13):4185–4195
Barzaiq OO, Loke SW (2016) Personal destination pattern analysis with applications to mobile advertising. Hum Centric Comput Inf Sci 6(1):17
Keegan N, Ji SY, Chaudhary A, Concolato C, Yu B, Jeong DH (2016) A survey of cloud-based network intrusion detection analysis. Hum Centric Comput Inf Sci 6(1):19
Yin C, Zhang S, Yin Z, Wang J (2017) Anomaly detection model based on data stream clustering. Cluster Comput 2017:1–10
Wang J, Cao J, Li B, Lee S, Sherratt S (2015) Bio-inspired ant colony optimization based clustering algorithm with mobile sinks for applications in consumer home automation networks. IEEE Trans Consum Electron 61(4):438–444
Acknowledgements
This work was funded by the National Natural Science Foundation of China (61772282, 61772454, 61811530332). It was also supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), Postgraduate Research & Practice Innovation Program of Jiangsu Province (KYCX18_1032), Chongqing Research Program of Basic Research and Frontier Technology (No. cstc2015jcyjA40026, No. cstc2016jcyjA0568), Natural Science Foundation of Jiangsu Province (BK20150460) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET). It was also funded by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education. Professor Jin Wang is the corresponding author.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yin, C., Shi, L., Sun, R. et al. Improved collaborative filtering recommendation algorithm based on differential privacy protection. J Supercomput 76, 5161–5174 (2020). https://doi.org/10.1007/s11227-019-02751-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-02751-7