Robustness analysis of privacy-preserving model-based recommendation schemes

被引:21
作者
Bilge, Alper [1 ]
Gunes, Ihsan [1 ]
Polat, Huseyin [1 ]
机构
[1] Anadolu Univ, Dept Comp Engn, TR-26470 Eskisehir, Turkey
关键词
Robustness; Shilling; Privacy; Recommendation; Model; Collaborative filtering; SYSTEMS; ATTACKS;
D O I
10.1016/j.eswa.2013.11.039
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy-preserving model-based recommendation methods are preferable over privacy-preserving memory-based schemes due to their online efficiency. Model-based prediction algorithms without privacy concerns have been investigated with respect to shilling attacks. Similarly, various privacy-preserving model-based recommendation techniques have been proposed to handle privacy issues. However, privacy-preserving model-based collaborative filtering schemes might be subjected to shilling or profile injection attacks. Therefore, their robustness against such attacks should be scrutinized. In this paper, we investigate robustness of four well-known privacy-preserving model-based recommendation methods against six shilling attacks. We first apply masked data-based profile injection attacks to privacy-preserving k-means-, discrete wavelet transform-, singular value decomposition-, and item-based prediction algorithms. We then perform comprehensive experiments using real data to evaluate their robustness against profile injection attacks. Next, we compare non-private model-based methods with their privacy-preserving correspondences in terms of robustness. Moreover, well-known privacy-preserving memory- and model-based prediction methods are compared with respect to robustness against shilling attacks. Our empirical analysis show that couple of model-based schemes with privacy are very robust. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3671 / 3681
页数:11
相关论文
共 40 条
[1]  
[Anonymous], 2008, IEEE Data Eng. Bull.
[2]   A scalable privacy-preserving recommendation scheme via bisecting k-means clustering [J].
Bilge, Alper ;
Polat, Huseyin .
INFORMATION PROCESSING & MANAGEMENT, 2013, 49 (04) :912-927
[3]   A comparison of clustering-based privacy-preserving collaborative filtering schemes [J].
Bilge, Alper ;
Polat, Huseyin .
APPLIED SOFT COMPUTING, 2013, 13 (05) :2478-2489
[4]   An improved privacy-preserving DWT-based collaborative filtering scheme [J].
Bilge, Alper ;
Polat, Huseyin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (03) :3841-3854
[5]   Advances in Clustering Collaborative Filtering by means of Fuzzy C-means and trust [J].
Birtolo, Cosimo ;
Ronca, Davide .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (17) :6997-7009
[6]   Recommender systems survey [J].
Bobadilla, J. ;
Ortega, F. ;
Hernando, A. ;
Gutierrez, A. .
KNOWLEDGE-BASED SYSTEMS, 2013, 46 :109-132
[7]   Segment-based injection attacks against collaborative filtering recommender systems [J].
Burke, R ;
Mobasher, B ;
Bhaumik, R ;
Williams, C .
Fifth IEEE International Conference on Data Mining, Proceedings, 2005, :577-580
[8]  
Burke RD, 2005, P WORKSH PRIV SEC AS, P35
[9]  
Burke R, 2011, RECOMMENDER SYSTEMS HANDBOOK, P805, DOI 10.1007/978-0-387-85820-3_25
[10]   "You Might Also Like:" Privacy Risks of Collaborative Filtering [J].
Calandrino, Joseph A. ;
Kilzer, Ann ;
Narayanan, Arvind ;
Felten, Edward W. ;
Shmatikov, Vitaly .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :231-246