Abstract:
IPTV providers employ third party content recommendation service to help end users find personalized content, and at the same time increase content sales and gain competi...Show MoreMetadata
Abstract:
IPTV providers employ third party content recommendation service to help end users find personalized content, and at the same time increase content sales and gain competitive advantage over other IPTV providers. However current implementations of recommendation services are mostly centralized where all the information about the users' profiles is stored on a dedicated server. A common fear among users is that their user profile data being misused by recommendation provider. Also sharing profile data makes the end users vulnerable to attacks like insider attacks, where an employee of the recommendation service may compromise the confidentiality and integrity of their profiles. For these reasons, privacy aware users intentionally decline to use recommendation or even provide inaccurate or wrong information because they consider it as untrusted service. On the other hand, to build an accurate recommendation model the user must reveal information that is typically considered private such as watching history, previous buying behaviour, content ratings, etc. Further privacy concerns arise when the user data are stored in countries that have privacy laws different from the country where the service is consumed. This poses a severe privacy hazard, since the users profiles are fully under the control of recommendation provider and stored in locations that are not legally bound to ensure the privacy of its users. Due to different legal structures that relate to data privacy laws in different legal jurisdictions maintaining user profile privacy is not a trivial solution. Regardless of the official legal framework requirements, when outsourcing users' profiles the private data should be kept safe when it is in the possession of any third party service. In this paper we introduce a private recommendation method using collaborative filtering techniques. The method preserves the privacy of its users when using the system and allows sharing data among different users in the network...
Published in: 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
Date of Conference: 23-27 May 2011
Date Added to IEEE Xplore: 18 August 2011
ISBN Information:
Print ISSN: 1573-0077