skip to main content
10.1145/1244002.1244151acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Effects of inconsistently masked data using RPT on CF with privacy

Published:11 March 2007Publication History

ABSTRACT

Randomized perturbation techniques (RPT) are applied to perturb the customers' private data to protect privacy while providing accurate referrals. In the RPT-based collaborative filtering (CF) with privacy schemes, proposed so far, users disguise their ratings in the same way to achieve consistently perturbed data. However, since users might have different levels of concerns about their privacy, the customers might decide to perturb their private data differently, which causes inconsistently masked data. How, then, can e-companies present referrals using such data and how can inconsistent data disguising affect accuracy and privacy?

References

  1. J. Canny. Collaborative filtering with privacy. In Proceedings of the IEEE Symposium on Security and Privacy, pages 45--57, Oakland, CA, USA, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Canny. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 238--245, Tampere, Finland, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. F. Cranor. 'I didn't buy it for myself' privacy and E-commerce personalization. In Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, pages 111--117, Washington, DC, October 30 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. F. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Technical report, AT&T Labs-Research, 1999.Google ScholarGoogle Scholar
  5. D. Gupta, M. Digiovanni, H. Narita, and K. Goldberg. Jester 2.0: A new linear-time collaborative filtering algorithm applied to jokes. In Proceedings of the Workshop on Recommender Systems: Algorithms and Evaluation, 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Berkeley, CA, USA, August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. L. Herlocker, J. A. Konstan, A. Borchers, and J. T. Riedl. An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Berkeley, CA, USA, August 15--19 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Polat and W. Du. Privacy-preserving collaborative filtering. International Journal of Electronic Commerce, 9(4):9--36, 2005.Google ScholarGoogle Scholar
  8. P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. T. Riedl. GroupLens: An open architecture for collaborative filtering of netnews. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, pages 175--186, Chapel Hill, NC, USA, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. M. Sarwar, G. Karypis, J. A. Konstan, and J. T. Reidl. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th International World Wide Web Conference (WWW10), pages 285--295, Hong Kong, China, May 1--5 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. M. Sarwar, G. Karypis, J. A. Konstan, and J. T. Riedl. Application of dimensionality reduction in recommender system--A case study. In Proceedings of the ACM WebKDD 2000 Web Mining for E-commerce Workshop, Boston, MA, USA, August 20 2000.Google ScholarGoogle ScholarCross RefCross Ref
  11. J. M. Seigneur and C. D. Jensen. Trading privacy for trust. In Proceedings of the 2nd International Conference on Trust Management, pages 93--107, Oxford, UK, March 29-April 1 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Effects of inconsistently masked data using RPT on CF with privacy

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
              March 2007
              1688 pages
              ISBN:1595934804
              DOI:10.1145/1244002

              Copyright © 2007 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 11 March 2007

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,650of6,669submissions,25%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader