ALAMBIC:: a privacy-preserving recommender system for electronic commerce

被引:56
作者
Aimeur, Esma [2 ]
Brassard, Gilles [2 ]
Fernandez, Jose M. [1 ]
Onana, Flavien Serge Mani [2 ]
机构
[1] Ecole Polytech, Dept Genie Informat, Montreal, PQ H3C 3A7, Canada
[2] Univ Montreal, Dept Informat & Rech Operat, Montreal, PQ H3C 3J7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
privacy protection; recommender system; secure two-party computation; semi-trusted third party; web personalization;
D O I
10.1007/s10207-007-0049-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy-protection vulnerabilities. Customers should be able to keep private their personal information, including their buying preferences, and they should not be tracked against their will. The commercial interests of merchants should also be protected by allowing them to make accurate recommendations without revealing legitimately compiled valuable information to third parties. We introduce a theoretical approach for a system called Alambic, which achieves the above privacy-protection objectives in a hybrid recommender system that combines content-based, demographic and collaborative filtering techniques. Our system splits customer data between the merchant and a semi-trusted third party, so that neither can derive sensitive information from their share alone. Therefore, the system could only be subverted by a coalition between these two parties.
引用
收藏
页码:307 / 334
页数:28
相关论文
共 78 条
  • [1] Taxation and the constitution
    Ackerman, B
    [J]. COLUMBIA LAW REVIEW, 1999, 99 (01) : 1 - 58
  • [2] Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
  • [3] AIMEUR E, 2002, P ITS 2002, P718
  • [4] Aimeur E., 2006, IADIS INT J WWW INTE, V4, P55
  • [5] AIMEUR E, 2006, P 2006 ACM S APPL CO, P872
  • [6] Blind Electronic Commerce
    Aimeur, Esma
    Brassard, Gilles
    Onana, Flavien Serge Mani
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (06) : 535 - 559
  • [7] [Anonymous], P 3 ACM C EL COMM TA
  • [8] ARDISSONO L, 2005, P 10 INT C US MOD ED
  • [9] Barak B., 2001, P 21 ANN INT CRYPT C, P1
  • [10] BENOR M, 1988, P 20 ANN ACM S THEOR, P11