Efficient Privacy-Preserving Recommendations based on Social Graphs

被引:10
作者
Wainakh, Aidmar [1 ]
Grube, Tim [2 ]
Daubert, Joerg [1 ]
Muehlhaeuser, Max [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Philipps Univ Marburg, Marburg, Germany
来源
RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS | 2019年
关键词
privacy-preserving data mining; distributed data; recommender system; association rules; efficiency; ASSOCIATION RULES;
D O I
10.1145/3298689.3347013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many recommender systems use association rules mining, a technique that captures relations between user interests and recommends new probable ones accordingly. Applying association rule mining causes privacy concerns as user interests may contain sensitive personal information (e.g., political views). This potentially even inhibits the user from providing information in the first place. Current distributed privacy-preserving association rules mining (PPARM) approaches use cryptographic primitives that come with high computational and communication costs, rendering PPARM unsuitable for large-scale applications such as social networks. We propose improvements in the efficiency and privacy of PPARM approaches by minimizing the required data. We propose and compare sampling strategies to sample the data based on social graphs in a privacy-preserving manner. The results on real-world datasets show that our sampling-based approach can achieve a high average precision score with as low as 50% sampling rate and, therefore, with a 50% reduction of communication cost.
引用
收藏
页码:78 / 86
页数:9
相关论文
共 37 条
[1]  
Afshari Doryaneh Hossien, 2017, J SOFT COMPUTING APP, V1, P44, DOI [10.5899/2017/jsca-00073, DOI 10.5899/2017/JSCA-00073]
[2]  
Agrawal D., 2001, Proc. 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[3]  
Agrawal R., P 20 INT C VERY LARG, DOI DOI 10.1055/S-2007-996789
[4]  
[Anonymous], 2006, IEEE INFOCOM 2006 25
[5]  
[Anonymous], 2007, P 5 ACM USENIX INT M
[6]  
[Anonymous], 2018, The Guardian
[7]  
Bakshy E, 2011, P 4 ACM INT C WEB SE, DOI DOI 10.1145/1935826.1935845
[8]  
Boyd Kendrick, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P451, DOI 10.1007/978-3-642-40994-3_29
[9]   Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir's secret sharing scheme [J].
Chahar, Harendra ;
Keshavamurthy, B. N. ;
Modi, Chirag .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (12) :1997-2007
[10]  
Chakaravarthy V., 2009, P 12 INT C DATABASE, P276