Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems

被引:0
作者
Xu, Guangquan [1 ,2 ]
Feng, Shicheng [2 ]
Xi, Hao [3 ,4 ]
Yan, Qingyang [2 ]
Li, Wenshan [5 ]
Wang, Cong [2 ]
Wang, Wei [6 ]
Liu, Shaoying [7 ,8 ]
Tian, Zhihong [9 ,10 ]
Zheng, Xi [11 ]
机构
[1] Shihezi Univ, Coll Informat Sci & Technol, Shihezi 832000, Peoples R China
[2] Tianjin Univ, Sch Cyber Secur, Tianjin 300350, Peoples R China
[3] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol BNRist, KLISS, Beijing 100084, Peoples R China
[4] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
[5] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
[6] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710049, Peoples R China
[7] East China Normal Univ, Software Engn Inst, Shanghai 200062, Peoples R China
[8] Hiroshima Univ, Sch Informat & Data Sci, Higashihiroshima 7398511, Japan
[9] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangdong Key Lab Ind Control Syst Secur, Guangzhou 511370, Peoples R China
[10] Guangzhou Univ, Huangpu Res Sch, Guangzhou 511370, Peoples R China
[11] Macquarie Univ, Sch Comp, Sydney, NSW 2109, Australia
基金
中国国家自然科学基金; 美国国家科学基金会; 海南省自然科学基金;
关键词
Recommender systems; Accuracy; Social networking (online); Protection; Privacy; Differential privacy; Collaborative filtering; Probabilistic logic; Information integrity; Sparse matrices; Differential trust; collaborative optimization system; privacy protection; MATRIX FACTORIZATION; FRAMEWORK;
D O I
10.1109/TIFS.2025.3566509
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the era where Web3.0 values data security and privacy, adopting groundbreaking methods to enhance privacy in recommender systems is crucial. Recommender systems need to balance privacy and accuracy, while also having the ability to overcome cold start problems. The Differential Trust Mechanism (DTM) introduced in this paper is such an approach. The DTM provides a unique use of Gaussian distributions in modeling trust relationships within data, offering a novel way to balance recommendation accuracy with user privacy. This mechanism innovatively applies differential privacy principles, using Gaussian noise addition to protect individual user data from inference attacks, while maintaining the integrity and utility of the overall dataset. Unlike traditional anonymization techniques that often compromise data utility or vulnerability to reverse engineering, DTM provides a robust solution by dynamically adjusting privacy levels based on the trustworthiness of data requests. By combining DTM with existing mainstream recommendation algorithms, the prediction accuracy of MAE and RMSE increases by at least 6.60% and 2.69%, respectively. This dual benefit positions DTM as a significant advancement in secure data processing, especially relevant for online businesses and platforms where personalized recommendations are crucial yet privacy concerns are paramount.
引用
收藏
页码:5054 / 5068
页数:15
相关论文
共 64 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions [J].
Adomavicius, G ;
Tuzhilin, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (06) :734-749
[3]   Privacy Matters: Vertical Federated Linear Contextual Bandits for Privacy-Protected Recommendation [J].
Cao, Zeyu ;
Liang, Zhipeng ;
Wu, Bingzhe ;
Zhang, Shu ;
Li, Hangyu ;
Wen, Ouyang ;
Rong, Yu ;
Zhao, Peilin .
PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, :154-166
[4]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101
[5]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[6]  
Eigner Fabienne, 2014, ACSAC, P316
[7]   Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing [J].
Erkin, Zekeriya ;
Veugen, Thijs ;
Toft, Tomas ;
Lagendijk, Reginald L. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1053-1066
[8]  
Fang H, 2014, AAAI CONF ARTIF INTE, P30
[9]   Poisoning Attacks to Graph-Based Recommender Systems [J].
Fang, Minghong ;
Yang, Guolei ;
Gong, Neil Zhenqiang ;
Liu, Jia .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :381-392
[10]   A differential privacy framework for matrix factorization recommender systems [J].
Friedman, Arik ;
Berkovsky, Shlomo ;
Kaafar, Mohamed Ali .
USER MODELING AND USER-ADAPTED INTERACTION, 2016, 26 (05) :425-458