skip to main content
10.1145/1329125.1329345acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

An agent-based approach for privacy-preserving recommender systems

Published:14 May 2007Publication History

ABSTRACT

Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an essential requirement of the underlying Information Filtering architectures, because the deployed Recommender Systems have to be accepted by privacy-aware users as well as information and service providers. Existing approaches neglect to address privacy in this multilateral way.

We have developed an approach for privacy-preserving Recommender Systems based on Multiagent System technology which enables applications to generate recommendations via various filtering techniques while preserving the privacy of all participants. We describe the main modules of our solution as well as an application we have implemented based on this approach.

References

  1. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In 28th Int'l Conf. on Very Large Databases (VLDB), Hong Kong, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proc. of the ACM SIGMOD Conference on Management of Data, pages 439--450. ACM Press, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Aïmeur, G. Brassard, J. M. Fernandez, and F. S. Mani Onana. Privacy-preserving demographic filtering. In SAC '06: Proceedings of the 2006 ACM symposium on Applied computing, pages 872--878, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bawa, R. Bayardo, Jr., and R. Agrawal. Privacy-preserving indexing of documents on the network. In Proc. of the 2003 VLDB, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Burke. Hybrid recommender systems: Survey and experiments. User Modeling and User-Adapted Interaction, 12(4):331--370, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45--57, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In IEEE Symposium on Foundations of Computer Science, pages 41--50, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Cissée. An architecture for agent-based privacy-preserving information filtering. In Proceedings of the 6th International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems, 2003.Google ScholarGoogle Scholar
  9. M. Deshpande and G. Karypis. Item-based top-N recommendation algorithms. ACM Trans. Inf. Syst., 22(1):143--177, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Foner. Political artifacts and personal privacy: The yenta multiagent distributed matchmaking system. PhD thesis, MIT, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Foundation for Intelligent Physical Agents. FIPA Abstract Architecture Specification, Version L, 2002.Google ScholarGoogle Scholar
  12. S. Fricke, K. Bsufka, J. Keiser, T. Schmidt, R. Sesseler, and S. Albayrak. Agent-based telematic services and telecom applications. Communications of the ACM, 44(4), April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Garfinkel, M. Rosenblum, and D. Boneh. Flexible OS support and applications for trusted computing. In Proceedings of HotOS-IX, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. Geissler and O. Kroll-Peters. Applying security standards to multi agent systems. In AAMAS Workshop: Safety & Security in Multiagent Systems, 2004.Google ScholarGoogle Scholar
  15. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proc. of STOC '87, pages 218--229, New York, NY, USA, 1987. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Jha, L. Kruger, and P. McDaniel. Privacy preserving clustering. In ESORICS 2005, volume 3679 of LNCS. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. Karjoth, M. Schunter, and M. Waidner. The platform for enterprise privacy practices: Privacy-enabled management of customer data. In PET 2002, volume 2482 of LNCS. Springer, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Link, J. Saia, T. Lane, and R. A. LaViolette. The impact of social networks on multiagent recommender systems. In Proc. of the Workshop on Cooperative Multiagent Learning (ECML/PKDD '05), 2005.Google ScholarGoogle Scholar
  19. B. N. Miller, J. A. Konstan, and J. Riedl. PocketLens: Toward a personal recommender system. ACM Trans. Inf. Syst., 22(3):437--476, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Polat and W. Du. SVD-based collaborative filtering with privacy. In Proc. of SAC '05, pages 791--795, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Schmidt. Advanced Security Infrastructure for Multiagent-Applications in the Telematic Area. PhD thesis, Technische Universität Berlin, 2002.Google ScholarGoogle Scholar
  22. G. J. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Proc. of Crypto '83, pages 51--67. Plenum Press, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  23. M. Teltzrow and A. Kobsa. Impacts of user privacy preferences on personalized systems: a comparative study. In Designing personalized user experiences in eCommerce, pages 315--332. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. Weyns, H. Parunak, F. Michel, T. Holvoet, and J. Ferber. Environments for multiagent systems: State-of-the-art and research challenges. In Environments for Multiagent Systems, volume 3477 of LNCS. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Wohltorf, R. Cissée, and A. Rieger. Berlintainment: An agent-based context-aware entertainment planning system. IEEE Communications Magazine, 43(6), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Wooldridge and N. R. Jennings. Intelligent agents: Theory and practice. Knowledge Engineering Review, 10(2):115--152, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  27. A. Yao. Protocols for secure computation. In Proc. of IEEE FOGS '82, pages 160--164, 1982.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. An agent-based approach for privacy-preserving recommender systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          AAMAS '07: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
          May 2007
          1585 pages
          ISBN:9788190426275
          DOI:10.1145/1329125

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 May 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,155of5,036submissions,23%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader