A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)

被引:18
作者
Beg, Saira [1 ]
Anjum, Adeel [1 ,6 ]
Ahmad, Mansoor [1 ]
Hussain, Shahid [5 ]
Ahmad, Ghufran [2 ]
Khan, Suleman [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[2] FAST Natl Univ Comp & Emerging Sci NUCES, Dept Comp Sci, Karachi, Pakistan
[3] Nothumbria Univ, Dept Comp & Informat Sci, Newcastle, NSW, Australia
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[5] Univ Oregon, Dept Comp & Informat Sci, Eugene, OR 97403 USA
[6] Southern Univ Sci & Technol, Dept Comp Sci & Engn, 1088 Xueyuan Ave, Shenzhen 518055, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile app recommendation system; Privacy-preserving protocol; Data collection; Social-influence; Reversible integer transform (RIT); Internet of Things (IoT); INTERNET; TRUST;
D O I
10.1016/j.jnca.2020.102874
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User trust is an important factor in the success of recommendation systems, including Internet of Things (IoT)based recommendation systems. However, such trust can be eroded in many different ways (e.g., unauthorized data modifications). Several privacy-preservation schemes have been designed for specific data and/or require strict assumptions (e.g., a private/secure communication channel between client-server and third-party authentication). However, these may limit their application in practice. Hence, in this paper we propose the Reversible Data Transform (RDT) algorithm based privacy-preserving data collection protocol. Our protocol allows us to achieve privacy preservation against beyond the scope processing and does not require a private channel or rely on a third-party authentication. Due to group formation, the disclosure probability of the internal disclosure attack will not be greater than 1/k. Similarly, the reversible privacy-preserving data mining approach protects beyond the scope processing. Findings from the experimentation demonstrates the utility of the proposed protocol and its potential to be deployed in a mobile app recommendation system.
引用
收藏
页数:10
相关论文
共 42 条
[1]  
[Anonymous], 2014, INT J COMPUT APPL
[2]  
[Anonymous], 2014, ACM SIGMOBILE MOB CO, DOI DOI 10.1145/2721896.2721908
[3]  
Banks Lerone, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P970, DOI 10.1109/CSE.2009.429
[4]   Version-sensitive mobile App recommendation [J].
Cao, Da ;
Nie, Liqiang ;
He, Xiangnan ;
Wei, Xiaochi ;
Shen, Jialie ;
Wu, Shunxiang ;
Chua, Tat-Seng .
INFORMATION SCIENCES, 2017, 381 :161-175
[5]   Mining smartphone data for app usage prediction and recommendations: A survey [J].
Cao, Hong ;
Lin, Miao .
PERVASIVE AND MOBILE COMPUTING, 2017, 37 :1-22
[6]   Which App? A recommender system of applications in markets: Implementation of the service for monitoring users' interaction [J].
Costa-Montenegro, Enrique ;
Belen Barragans-Martinez, Ana ;
Rey-Lopez, Marta .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (10) :9367-9375
[7]  
De Cristofaro E., RECLAIMING PRIVACY S
[8]  
El Khaddar M.A., 2017, Smartphones from an applied research perspective, V137, P137
[9]  
Erfan M., 2015, AIST, P28
[10]   An overview of recommender systems in the internet of things [J].
Felfernig, Alexander ;
Polat-Erdeniz, Seda ;
Uran, Christoph ;
Reiterer, Stefan ;
Atas, Muesluem ;
Thi Ngoc Trang Tran ;
Azzoni, Paolo ;
Kiraly, Csaba ;
Dolui, Koustabh .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2019, 52 (02) :285-309