skip to main content
10.1145/2361407.2361420acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Privacy-preserving content-based recommender system

Published: 06 September 2012 Publication History

Abstract

By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely, also poses a serious privacy risk for the customers: ratings may be very personal or revealing, and thus highly privacy sensitive. Service providers could process the collected rating data for other purposes, sell them to third parties or fail to provide adequate physical security. In this paper, we propose technological mechanisms to protect the privacy of individuals in a recommender system. Our proposal is founded on homomorphic encryption, which is used to obscure the private rating information of the customers from the service provider. While the user's privacy is respected by the service provider, by generating recommendations using encrypted customer ratings, the service provider's commercially valuable item-item similarities are protected against curious entities, in turn. Our proposal explores simple and efficient cryptographic techniques to generate private recommendations using a server-client model, which neither relies on (trusted) third parties, nor requires interaction with peer users. The main strength of our contribution lies in providing a highly efficient solution without resorting to unrealistic assumptions.

References

[1]
G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng., 17(6):734--749, 2005.
[2]
R. Agrawal and R. Srikant. Privacy-preserving data mining. SIGMOD Rec., 29:439--450, May 2000.
[3]
S. Agrawal, V. Krishnan, and J. Haritsa. On addressing efficiency concerns in privacy-preserving mining. Proc. of 9th Intl. Conf. on Database Systems for Advanced Applications (DASFAA), pages 113--124, 2004.
[4]
T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Signal Processing, 2009.
[5]
J. F. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45--57, 2002.
[6]
J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, pages 238--245, New York, NY, USA, 2002. ACM Press.
[7]
R. Cissee and S. Albayrak. An agent-based approach for privacy-preserving recommender systems. In AAMAS '07: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, pages 1--8, New York, NY, USA, 2007. ACM.
[8]
N. Doraswamy and D. Harkins. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1999.
[9]
Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk. Privacy enhanced recommender system. In Thirty-first Symposium on Information Theory in the Benelux, pages 35--42, Rotterdam, 2010.
[10]
Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk. Efficiently computing private recommendations. In International Conference on Acoustic, Speech and Signal Processing-ICASSP, pages 5864--5867, Prag, Czech Republic, May/2011 2011.
[11]
Z. Erkin, T. Veugen, and R. L. Lagendijk. Generating private recommendations in a social trust network. In The International Conference on Computational Aspects of Social Networks (CASoN 2011), Salamanca, Spain, 2011. IEEE.
[12]
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk. Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Transactions on Information Forensics and Security, 2012. to appear.
[13]
C. Fontaine and F. Galand. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 2007.
[14]
O. Goldreich. Foundations of Cryptography II. Cambridge University Press, 2004.
[15]
L. Indvik. Forrester: E-commerce to reach nearly $300 billion in U.S. by 2015. http://mashable.com/2011/02/28/forrester-e-commerce/, February 28 2011. Online.
[16]
Y. Lindell and B. Pinkas. Privacy preserving data mining. In Journal of Cryptology, pages 36--54. Springer-Verlag, 2000.
[17]
G. Linden, B. Smith, and J. York. Amazon.com recommendations: item-to-item collaborative filtering. Internet Computing, IEEE, 7(1):76 -- 80, jan/feb 2003.
[18]
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 627--636, New York, NY, USA, 2009. ACM.
[19]
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In J. Stern, editor, Advances in Cryptology -- EUROCRYPT '99, volume 1592 of LNCS, pages 223--238. Springer, May 2-6, 1999.
[20]
H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In ICDM, pages 625--628, 2003.
[21]
H. Polat and W. Du. SVD-based collaborative filtering with privacy. In SAC '05: Proceedings of the 2005 ACM symposium on Applied computing, pages 791--795, New York, NY, USA, 2005. ACM Press.
[22]
N. Ramakrishnan, B. J. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis. Privacy risks in recommender systems. IEEE Internet Computing, 5(6):54--62, 2001.
[23]
B. Sarwar, G. Karypis, J. Konstan, and J. Riedl. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th international conference on World Wide Web, WWW '01, pages 285--295, New York, NY, USA, 2001. ACM.
[24]
R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux. Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In RecSys '09: Proceedings of the third ACM conference on Recommender systems, pages 157--164, New York, NY, USA, 2009. ACM.
[25]
J. R. Troncoso-Pastoriza, S. Katzenbeisser, M. U. Celik, and A. N. Lemma. A secure multidimensional point inclusion protocol. In ACM Workshop on Multimedia and Security, pages 109--120, 2007.
[26]
S. Zhang, J. Ford, and F. Makedon. Deriving private information from randomly perturbed ratings. In Proceedings of the Sixth SIAM International Conference on Data Mining, pages 59--69, 2006.

Cited By

View all
  • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/364382118:5(1-21)Online publication date: 30-Jan-2024
  • (2023)VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear ComputationsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329048318(4214-4228)Online publication date: 2023
  • (2022)A Cascade Framework for Privacy-Preserving Point-of-Interest Recommender SystemElectronics10.3390/electronics1107115311:7(1153)Online publication date: 6-Apr-2022
  • Show More Cited By

Index Terms

  1. Privacy-preserving content-based recommender system

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '12: Proceedings of the on Multimedia and security
    September 2012
    184 pages
    ISBN:9781450314176
    DOI:10.1145/2361407
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 September 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content-based recommender systems
    2. homomorphic encryption
    3. privacy

    Qualifiers

    • Research-article

    Conference

    MM&Sec '12
    Sponsor:
    MM&Sec '12: Multimedia and Security Workshop
    September 6 - 7, 2012
    Coventry, United Kingdom

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/364382118:5(1-21)Online publication date: 30-Jan-2024
    • (2023)VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear ComputationsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329048318(4214-4228)Online publication date: 2023
    • (2022)A Cascade Framework for Privacy-Preserving Point-of-Interest Recommender SystemElectronics10.3390/electronics1107115311:7(1153)Online publication date: 6-Apr-2022
    • (2022)Content-Based Recommender System for Similar Products in E-CommerceEdge Analytics10.1007/978-981-19-0019-8_46(617-628)Online publication date: 4-Apr-2022
    • (2022)Confluence of Cryptography and Differential Privacy: A Hybrid Approach for Privacy Preserving Collaborative FilteringProceedings of the International Conference on Paradigms of Communication, Computing and Data Sciences10.1007/978-981-16-5747-4_29(333-345)Online publication date: 1-Jan-2022
    • (2021)Identifying Attack Models for Securing Cluster-based Recommendation SystemRecent Patents on Engineering10.2174/187221211466620040309105314:3(324-338)Online publication date: 19-Jan-2021
    • (2021)Tracking and PersonalizationModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_9(171-202)Online publication date: 29-Jul-2021
    • (2020)Matrix Factorization for Recommendation SystemAdvances in Artificial Intelligence and Data Engineering10.1007/978-981-15-3514-7_22(267-280)Online publication date: 14-Aug-2020
    • (2018)A Systematic Mapping Study of Content Based Filtering Recommender SystemsInternational Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 201810.1007/978-3-030-03146-6_30(273-282)Online publication date: 21-Dec-2018
    • (2018)Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender SystemsCloud Computing and Security10.1007/978-3-030-00012-7_63(691-706)Online publication date: 13-Sep-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media