Skip to main content

A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7122))

Abstract

Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture that protects user privacy in such collaborative-filtering systems, in which users are profiled on the basis of their ratings. Our approach capitalizes on the combination of two perturbative techniques, namely the forgery and the suppression of ratings. In our scenario, users rate those items they have an opinion on. However, in order to avoid privacy risks, they may want to refrain from rating some of those items, and/or rate some items that do not reflect their actual preferences. On the other hand, forgery and suppression may degrade the quality of the recommendation system. Motivated by this, we describe the implementation details of the proposed architecture and present a formulation of the optimal trade-off among privacy, forgery rate and suppression rate. Finally, we provide a numerical example that illustrates our formulation.

This work was supported in part by the Spanish Government through Projects CONSOLIDER INGENIO 2010 CSD2007-00004 “ARES” and TEC2010-20572-C02-02 “CONSEQUENCE”, and by the Catalan Government under Grant 2009 SGR 1362. D.Rebollo-Monedero is the recipient of a Juan de la Cierva postdoctoral fellowship, JCI-2009-05259, from the Spanish Ministry of Science and Innovation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Goldberg, D., Nichols, D., Oki, B.M., Terry, D.: Using collaborative filtering to weave an information tapestry. Commun. ACM 35(12), 61–70 (1992)

    Article  Google Scholar 

  2. Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. (January 2009)

    Google Scholar 

  3. Amazon.com, http://www.amazon.com

  4. Movielens, http://movielens.umn.edu

  5. Netflix, http://www.netflix.com

  6. Digg, http://digg.com

  7. Oard, D., Kim, J.: Implicit feedback for recommender systems. In: Proc. AAAI Workshop Recommender Syst., pp. 81–83 (1998)

    Google Scholar 

  8. Cranor, L.F.: I didn’t buy it for myself. Privacy and e-commerce personalization. In: Proc. ACM Workshop on Privacy in the Electron. Society, Washington, DC, pp. 111–117 (2003)

    Google Scholar 

  9. Zaslow, J.: If TiVo thinks you are gay, here’s how to set it straight (November 2002), http://online.wsj.com/article_email/SB1038261936872356908.html

  10. Fox, S.: Trust and privacy online: Why americans want to rewrite the rules. Pew Internet and Amer. Life Project, Res. Rep. (August 2000)

    Google Scholar 

  11. Hoffman, D.L., Novak, T.P., Peralta, M.: Building consumer trust online. Commun. ACM 42(4), 80–85 (1999)

    Article  Google Scholar 

  12. Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proc. SIAM Int. Conf. Data Min. (SDM). IEEE Comput. Soc. (2003)

    Google Scholar 

  13. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proc. IEEE Int. Conf. Data Min. (ICDM), pp. 99–106. IEEE Comput. Soc., Washington, DC (2003)

    Chapter  Google Scholar 

  14. Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. ACM SIGMOD Int. Conf. Manage. Data, pp. 37–48. ACM (2005)

    Google Scholar 

  15. Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proc. ACM Int. Symp. Appl. Comput. (SASC), pp. 791–795. ACM (2005)

    Google Scholar 

  16. Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proc. ACM SIGMOD Int. Conf. Manage. Data, Santa Barbara, CA, pp. 247–255 (2001)

    Google Scholar 

  17. Jester: The online joke recommender, http://eigentaste.berkeley.edu/

  18. Rebollo-Monedero, D., Forné, J.: Optimal query forgery for private information retrieval. IEEE Trans. Inform. Theory 56(9), 4631–4642 (2010)

    Article  MathSciNet  Google Scholar 

  19. Parra-Arnau, J., Rebollo-Monedero, D., Forné, J.: A privacy-preserving architecture for the semantic web based on tag suppression. In: Proc. Int. Conf. Trust, Privacy, Security, Digit. Bus. (TRUSTBUS), Bilbao, Spain (August 2010)

    Google Scholar 

  20. Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proc. ACM SIGIR Conf. Res., Develop. Inform. Retrieval, pp. 238–245. ACM, Tampere (2002)

    Google Scholar 

  21. Canny, J.F.: Collaborative filtering with privacy. In: Proc. IEEE Symp. Security, Privacy (SP), pp. 45–57 (2002)

    Google Scholar 

  22. Ahmad, W., Khokhar, A.: An architecture for privacy preserving collaborative filtering on web portals. In: Proc. IEEE Int. Symp. Inform. Assurance, Security (IAS), pp. 273–278. IEEE Comput. Soc., Washington, DC (2007)

    Chapter  Google Scholar 

  23. Zhan, J., Hsieh, C.L., Wang, I.C., Hsu, T.S., Liau, C.J., Wang, D.W.: Privacy-preserving collaborative recommender systems. IEEE Trans. Syst. Man, Cybern. 40(4), 472–476 (2010)

    Article  Google Scholar 

  24. Miller, B., Bradley, N., Riedl, J.A.K.J.: Pocketlens: Toward a personal recommender system. ACM Trans. Inform. Syst. 22(3), 437–476 (2004)

    Article  Google Scholar 

  25. Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proc. ACM Conf. Recommender Syst. (RecSys), pp. 9–16. ACM (2007)

    Google Scholar 

  26. Bianchi, G., Bonola, M., Falletta, V., Proto, F.S., Teofili, S.: The SPARTA pseudonym and authorization system. Sci. Comput. Program 74(1-2), 23–33 (2008)

    Article  MathSciNet  Google Scholar 

  27. Benjumea, V., López, J., Linero, J.M.T.: Specification of a framework for the anonymous use of privileges. Telemat., Informat. 23(3), 179–195 (2006)

    Article  Google Scholar 

  28. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: Proc. IEEE Symp. Netw. Distrib. Syst. Security, SNDSS (2010)

    Google Scholar 

  29. Fredrikson, M., Livshits, B.: RePriv: Re-envisioning in-browser privacy. In: Proc. IEEE Symp. Security, Privacy (SP) (May 2011)

    Google Scholar 

  30. Domingo-Ferrer, J.: Coprivacy: Towards a Theory of Sustainable Privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 258–268. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  31. Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Commun. ACM 18(11), 613–620 (1975)

    Article  MATH  Google Scholar 

  32. Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734–749 (2005)

    Article  Google Scholar 

  33. Shannon, C.E.: A mathematical theory of communication. Bell Syst., Tech. J. 27 (1948)

    Google Scholar 

  34. Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, New York (2006)

    MATH  Google Scholar 

  35. Jaynes, E.T.: On the rationale of maximum-entropy methods. Proc. IEEE 70(9), 939–952 (1982)

    Article  Google Scholar 

  36. Jaynes, E.T.: Information theory and statistical mechanics II. Phys. Review Ser. II 108(2), 171–190 (1957)

    MathSciNet  Google Scholar 

  37. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst., Tech. J. (1949)

    Google Scholar 

  38. Wyner, A.: The wiretap channel. Bell Syst., Tech. J. 54 (1975)

    Google Scholar 

  39. Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 24, 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  40. Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  41. Díaz, C.: Anonymity and privacy in electronic services. Ph.D. dissertation, Katholieke Univ. Leuven (December 2005)

    Google Scholar 

  42. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Parra-Arnau, J., Rebollo-Monedero, D., Forné, J. (2012). A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics