skip to main content
10.1145/2695664.2695866acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

On the discovery of fake binary ratings

Published: 13 April 2015 Publication History

Abstract

Privacy-preserving collaborative filtering methods promise to preserve privacy of individuals. In general, privacy has two aspects, preserving the rating values of users and masking who rated which items. In this study, we analyze a privacy-preserving collaborative filtering method for binary data referred to as randomized response technique. We develop a method targeting the second aspect of privacy to discover fake binary ratings using auxiliary and public information.

References

[1]
Canny, J. Collaborative filtering with privacy. In Proceedings of the IEEE Symposium on Security and Privacy, 2002, 45--57.
[2]
Canny, J. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2002, 238--245.
[3]
Cranor, L. F. 'I didn't buy it for myself' Privacy and ecommerce personalization, In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2003, 111--117.
[4]
Polat, H. and Du, W. Privacy-preserving collaborative filtering using randomized perturbation techniques, In Proceedings of the 3rd IEEE International Conference on Data Mining, 2003, 625--628.
[5]
Polat, H. and Du, W. Privacy-preserving collaborative filtering. International Journal of Electronic Commerce, 9 (4), 2005, 9--35.
[6]
Polat, H. and Du, W. Achieving private recommendations using randomized response techniques. Lecture Notes in Computer Science, 3918, 2006, 637--646.
[7]
Bilge, A., Kaleli, C., Yakut, I., Gunes, I., and Polat, H. A survey of privacy-preserving collaborative filtering schemes. International Journal of Software Engineering and Knowledge Engineering, 23 (8), 2013, 1085--1108.
[8]
Warner, S. L. Randomized response: A survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc., 60 (309), 1965, 63--69.
[9]
Okkalioglu, M., Koc, M., and Polat, H. Deriving binary ratings from masked data. Submitted for review.
[10]
Agrawal, R. and Srikant, R. Privacy-preserving data mining. In Proceedings of the 19th ACM SIGMOD International Conference on Management of Data, 2000, 439--450.
[11]
Agrawal, D. and Aggarwal, C. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium of Principles of Database Systems, 2001, 247--255.
[12]
Rizvi, S. J. and Haritsa, J. R. Maintaining data privacy in association rule mining. In Proceedings of the 28th International Conference on Very Large Data Bases, 2002, 682--693.
[13]
Evfimievski, A., Gehrke, J., and Srikant, R. Limiting Privacy breaches in privacy preserving data mining. In Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2003, 211--222.
[14]
Huang, Z. and Du, W. OptRR: Optimizing randomized response schemes for privacy-preserving data mining. In Proceedings of the 24th International Conference on Data Engineering, 2008, 705--714.
[15]
Calandrino, J. A., Kilzer, A., Narayanan, A., Felten, E. W., and Shmatikov, V. "You might also like:" Privacy risks of collaborative filtering. In Proceedings of the IEEE Symposium on Security and Privacy, 2011, 231--246.
[16]
Zhang, S., Ford, J., and Makedon, F. Deriving private information from randomly perturbed ratings. In Proceedings of the 6th SIAM International Conference on Data Mining, 2006, 59--69.
[17]
Yakut, I. and Polat, H. Estimating NBC-based recommendations on arbitrarily partitioned data with privacy. Knowledge-Based Systems, 36, 2012, 353--362.
[18]
Miyahara, K. and Pazzani, M. Collaborative filtering with the simple Bayesian classifier. Lecture Notes in Computer Science, 1886, 2000, 679--689.

Cited By

View all
  • (2023)Spider Monkey Based K-Means Dynamic Collaborative Filtering for Movie Recommendation SystemsProceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022)10.1007/978-3-031-27524-1_15(143-152)Online publication date: 28-Mar-2023
  • (2020)Multilingual Opinion Mining Movie Recommendation System Using RNNProceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)10.1007/978-981-15-3369-3_44(589-605)Online publication date: 28-Apr-2020
  • (2017)BÖLÜNMÜŞ VERİ-TABANLI GİZLİLİĞİ KORUYAN ORTAK FİLTRELEME SİSTEMLERİNDE GİZLİ VERİNİN ELDE EDİLMESİGazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi10.17341/gazimmfd.30059432:1Online publication date: 23-Mar-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied Computing
April 2015
2418 pages
ISBN:9781450331968
DOI:10.1145/2695664
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. auxiliary information
  2. binary data
  3. fake ratings
  4. privacy analysis

Qualifiers

  • Research-article

Funding Sources

  • TUBITAK

Conference

SAC 2015
Sponsor:
SAC 2015: Symposium on Applied Computing
April 13 - 17, 2015
Salamanca, Spain

Acceptance Rates

SAC '15 Paper Acceptance Rate 291 of 1,211 submissions, 24%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Spider Monkey Based K-Means Dynamic Collaborative Filtering for Movie Recommendation SystemsProceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022)10.1007/978-3-031-27524-1_15(143-152)Online publication date: 28-Mar-2023
  • (2020)Multilingual Opinion Mining Movie Recommendation System Using RNNProceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)10.1007/978-981-15-3369-3_44(589-605)Online publication date: 28-Apr-2020
  • (2017)BÖLÜNMÜŞ VERİ-TABANLI GİZLİLİĞİ KORUYAN ORTAK FİLTRELEME SİSTEMLERİNDE GİZLİ VERİNİN ELDE EDİLMESİGazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi10.17341/gazimmfd.30059432:1Online publication date: 23-Mar-2017
  • (2017)Design and Implementation of Movie Recommendation System Based on Knn Collaborative Filtering AlgorithmITM Web of Conferences10.1051/itmconf/2017120400812(04008)Online publication date: 5-Sep-2017
  • (2016)Reconstructing rated items from perturbed dataNeurocomputing10.1016/j.neucom.2016.05.014207:C(374-386)Online publication date: 26-Sep-2016
  • (2015)On the Privacy of Horizontally Partitioned Binary Data-Based Privacy-Preserving Collaborative FilteringRevised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 948110.1007/978-3-319-29883-2_13(199-214)Online publication date: 21-Sep-2015
  • (2015)From existing trends to future trends in privacy-preserving collaborative filteringWiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery10.1002/widm.11635:6(276-291)Online publication date: 1-Nov-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media