Abstract
Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture that protects user privacy in such collaborative-filtering systems, in which users are profiled on the basis of their ratings. Our approach capitalizes on the combination of two perturbative techniques, namely the forgery and the suppression of ratings. In our scenario, users rate those items they have an opinion on. However, in order to avoid privacy risks, they may want to refrain from rating some of those items, and/or rate some items that do not reflect their actual preferences. On the other hand, forgery and suppression may degrade the quality of the recommendation system. Motivated by this, we describe the implementation details of the proposed architecture and present a formulation of the optimal trade-off among privacy, forgery rate and suppression rate. Finally, we provide a numerical example that illustrates our formulation.
This work was supported in part by the Spanish Government through Projects CONSOLIDER INGENIO 2010 CSD2007-00004 “ARES” and TEC2010-20572-C02-02 “CONSEQUENCE”, and by the Catalan Government under Grant 2009 SGR 1362. D.Rebollo-Monedero is the recipient of a Juan de la Cierva postdoctoral fellowship, JCI-2009-05259, from the Spanish Ministry of Science and Innovation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Goldberg, D., Nichols, D., Oki, B.M., Terry, D.: Using collaborative filtering to weave an information tapestry. Commun. ACM 35(12), 61–70 (1992)
Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. (January 2009)
Amazon.com, http://www.amazon.com
Movielens, http://movielens.umn.edu
Netflix, http://www.netflix.com
Digg, http://digg.com
Oard, D., Kim, J.: Implicit feedback for recommender systems. In: Proc. AAAI Workshop Recommender Syst., pp. 81–83 (1998)
Cranor, L.F.: I didn’t buy it for myself. Privacy and e-commerce personalization. In: Proc. ACM Workshop on Privacy in the Electron. Society, Washington, DC, pp. 111–117 (2003)
Zaslow, J.: If TiVo thinks you are gay, here’s how to set it straight (November 2002), http://online.wsj.com/article_email/SB1038261936872356908.html
Fox, S.: Trust and privacy online: Why americans want to rewrite the rules. Pew Internet and Amer. Life Project, Res. Rep. (August 2000)
Hoffman, D.L., Novak, T.P., Peralta, M.: Building consumer trust online. Commun. ACM 42(4), 80–85 (1999)
Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proc. SIAM Int. Conf. Data Min. (SDM). IEEE Comput. Soc. (2003)
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proc. IEEE Int. Conf. Data Min. (ICDM), pp. 99–106. IEEE Comput. Soc., Washington, DC (2003)
Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. ACM SIGMOD Int. Conf. Manage. Data, pp. 37–48. ACM (2005)
Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proc. ACM Int. Symp. Appl. Comput. (SASC), pp. 791–795. ACM (2005)
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proc. ACM SIGMOD Int. Conf. Manage. Data, Santa Barbara, CA, pp. 247–255 (2001)
Jester: The online joke recommender, http://eigentaste.berkeley.edu/
Rebollo-Monedero, D., Forné, J.: Optimal query forgery for private information retrieval. IEEE Trans. Inform. Theory 56(9), 4631–4642 (2010)
Parra-Arnau, J., Rebollo-Monedero, D., Forné, J.: A privacy-preserving architecture for the semantic web based on tag suppression. In: Proc. Int. Conf. Trust, Privacy, Security, Digit. Bus. (TRUSTBUS), Bilbao, Spain (August 2010)
Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proc. ACM SIGIR Conf. Res., Develop. Inform. Retrieval, pp. 238–245. ACM, Tampere (2002)
Canny, J.F.: Collaborative filtering with privacy. In: Proc. IEEE Symp. Security, Privacy (SP), pp. 45–57 (2002)
Ahmad, W., Khokhar, A.: An architecture for privacy preserving collaborative filtering on web portals. In: Proc. IEEE Int. Symp. Inform. Assurance, Security (IAS), pp. 273–278. IEEE Comput. Soc., Washington, DC (2007)
Zhan, J., Hsieh, C.L., Wang, I.C., Hsu, T.S., Liau, C.J., Wang, D.W.: Privacy-preserving collaborative recommender systems. IEEE Trans. Syst. Man, Cybern. 40(4), 472–476 (2010)
Miller, B., Bradley, N., Riedl, J.A.K.J.: Pocketlens: Toward a personal recommender system. ACM Trans. Inform. Syst. 22(3), 437–476 (2004)
Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proc. ACM Conf. Recommender Syst. (RecSys), pp. 9–16. ACM (2007)
Bianchi, G., Bonola, M., Falletta, V., Proto, F.S., Teofili, S.: The SPARTA pseudonym and authorization system. Sci. Comput. Program 74(1-2), 23–33 (2008)
Benjumea, V., López, J., Linero, J.M.T.: Specification of a framework for the anonymous use of privileges. Telemat., Informat. 23(3), 179–195 (2006)
Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: Proc. IEEE Symp. Netw. Distrib. Syst. Security, SNDSS (2010)
Fredrikson, M., Livshits, B.: RePriv: Re-envisioning in-browser privacy. In: Proc. IEEE Symp. Security, Privacy (SP) (May 2011)
Domingo-Ferrer, J.: Coprivacy: Towards a Theory of Sustainable Privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 258–268. Springer, Heidelberg (2010)
Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Commun. ACM 18(11), 613–620 (1975)
Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734–749 (2005)
Shannon, C.E.: A mathematical theory of communication. Bell Syst., Tech. J. 27 (1948)
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, New York (2006)
Jaynes, E.T.: On the rationale of maximum-entropy methods. Proc. IEEE 70(9), 939–952 (1982)
Jaynes, E.T.: Information theory and statistical mechanics II. Phys. Review Ser. II 108(2), 171–190 (1957)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst., Tech. J. (1949)
Wyner, A.: The wiretap channel. Bell Syst., Tech. J. 54 (1975)
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 24, 339–348 (1978)
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)
Díaz, C.: Anonymity and privacy in electronic services. Ph.D. dissertation, Katholieke Univ. Leuven (December 2005)
Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Parra-Arnau, J., Rebollo-Monedero, D., Forné, J. (2012). A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-28879-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28878-4
Online ISBN: 978-3-642-28879-1
eBook Packages: Computer ScienceComputer Science (R0)