Privacy-Preserving Fair Item Ranking

被引:2
作者
Sun, Jia Ao [1 ,2 ]
Pentyala, Sikha [1 ,3 ]
De Cock, Martine [3 ,4 ]
Farnadi, Golnoosh [1 ,2 ,5 ]
机构
[1] Mila Quebec AI Inst, Montreal, PQ, Canada
[2] Univ Montreal, Montreal, PQ, Canada
[3] Univ Washington, Tacoma, WA USA
[4] Univ Ghent, Ghent, Belgium
[5] HEC Montreal, Montreal, PQ, Canada
来源
ADVANCES IN INFORMATION RETRIEVAL, ECIR 2023, PT II | 2023年 / 13981卷
关键词
Ranking; Privacy; Fairness;
D O I
10.1007/978-3-031-28238-6_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Users worldwide access massive amounts of curated data in the form of rankings on a daily basis. The societal impact of this ease of access has been studied and work has been done to propose and enforce various notions of fairness in rankings. Current computational methods for fair item ranking rely on disclosing user data to a centralized server, which gives rise to privacy concerns for the users. This work is the first to advance research at the conjunction of producer (item) fairness and consumer (user) privacy in rankings by exploring the incorporation of privacy-preserving techniques; specifically, differential privacy and secure multi-party computation. Our work extends the equity of amortized attention ranking mechanism to be privacy-preserving, and we evaluate its effects with respect to privacy, fairness, and ranking quality. Our results using real-world datasets show that we are able to effectively preserve the privacy of users and mitigate unfairness of items without making additional sacrifices to the quality of rankings in comparison to the ranking mechanism in the clear.
引用
收藏
页码:188 / 203
页数:16
相关论文
共 50 条
  • [21] Privacy-preserving collaborative filtering
    Polat, H
    Du, WL
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2005, 9 (04) : 9 - 35
  • [22] Privacy-Preserving Classifier Learning
    Brickell, Justin
    Shmatikov, Vitaly
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 128 - 147
  • [23] Privacy-Preserving Deep Learning
    Shokri, Reza
    Shmatikov, Vitaly
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1310 - 1321
  • [24] Privacy-Preserving and Fair Crowdsourcing Framework With Fine-Grained Reuse Based on Blockchain
    Jiang, Shunrong
    Zhang, Xiao
    Chen, Jingwei
    Li, Jinpeng
    Wu, Haiqin
    Liu, Yiliang
    Zhou, Yong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4061 - 4075
  • [25] Privacy-Preserving Data Mashup
    Barhamgi, Mahmoud
    Benslimane, Djamal
    Ghedira, Chirine
    Gancarski, Alda Lopes
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 467 - 474
  • [26] Privacy-preserving SVM classification
    Vaidya, Jaideep
    Yu, Hwanjo
    Jiang, Xiaoqian
    KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 14 (02) : 161 - 178
  • [27] Privacy-preserving Link Discovery
    He, Xiaoyun
    Shafiq, Basit
    Vaidya, Jaideep
    Adam, Nabil
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 909 - 915
  • [28] Model averaging with privacy-preserving
    He, Baihua
    Dong, Fangli
    COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION, 2022, 51 (04) : 1401 - 1414
  • [29] Privacy-Preserving Alibi Systems
    Davis, Benjamin
    Chen, Hao
    Franklin, Matthew
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [30] Privacy-preserving Trust Verification
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Shafiq, Basit
    Adam, Nabil
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 139 - 148