Privacy-preserving Collaborative Filtering by Distributed Mediation

被引:3
作者
Tassa, Tamir [1 ]
Ben Horin, Alon [1 ]
机构
[1] Open Univ Israel, 1 Univ Rd,POB 808, IL-43107 Raanana, Israel
关键词
Recommender systems; Collaborative Filtering; distributed computing; privacy; the mediated model; ASSOCIATION RULES; COMPUTATION;
D O I
10.1145/3542950
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recommender systems have become very influential in our everyday decision making, e.g., helping us choose a movie from a content platform, or offering us suitable products on e-commerce websites. While most vendors who utilize recommender systems rely exclusively on training data consisting of past transactions that took place through them, it would be beneficial to base recommendations on the rating data of more than one vendor. However, enlarging the training data by means of sharing information between different vendors may jeopardize the privacy of users. We devise here secure multi-party protocols that enable the practice of Collaborative Filtering (CF) in a manner that preserves the privacy of the vendors and users. Shmueli and Tassa [38] introduced privacy-preserving protocols of CF that involved a mediator; namely, an external entity that assists in performing the computations. They demonstrated the significant advantages of mediation in that context. We take here the mediation approach into the next level by using several independent mediators. Such distributed mediation maintains all of the advantages that were identified by Shmueli and Tassa, and offers additional ones, in comparison with the single-mediator protocols: stronger security and dramatically shorter runtimes. In addition, while all prior art assumed limited and unrealistic settings, in which each user can purchase any given item through only one vendor, we consider here a general and more realistic setting, which encompasses all previously considered settings, where users can choose between different competing vendors. We demonstrate the appealing performance of our protocols through extensive experimentation.
引用
收藏
页数:26
相关论文
共 53 条
[1]  
Ahmad Waseem, 2007, 2007 3rd International Symposium on Information Assurance and Security, P273
[2]  
Alwen J, 2008, LECT NOTES COMPUT SC, V5157, P497, DOI 10.1007/978-3-540-85174-5_28
[3]  
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775142
[4]  
[Anonymous], 2012, CoRR
[5]   Secure Centrality Computation Over Multiple Networks [J].
Asharov, Gilad ;
Bonchi, Francesco ;
Garcia Soriano, David ;
Tassa, Tamir .
PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, :957-966
[6]  
Basu A., 2011, Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011), P223, DOI 10.1109/CloudCom.2011.38
[7]   Privacy-preserving collaborative filtering on the cloud - practical implementation experiences [J].
Basu, Anirban ;
Vaidya, Jaideep ;
Kikuchi, Hiroaki ;
Dimitrakos, Theo .
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, :406-413
[8]  
Basu Anirban, 2012, P IFIP INT C TRUST M, P17
[9]  
Cantador I, 2015, Recommender systems handbook, P919, DOI DOI 10.1007/978-1-4899-7637-627
[10]   Fast Large-Scale Honest-Majority MPC for Malicious Adversaries [J].
Chida, Koji ;
Genkin, Daniel ;
Hamada, Koki ;
Ikarashi, Dai ;
Kikuchi, Ryo ;
Lindell, Yehuda ;
Nof, Arid .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 :34-64