When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

被引:29
作者
Liu, Xiao [1 ]
Liu, An [1 ,2 ]
Zhang, Xiangliang [2 ]
Li, Zhixu [1 ]
Liu, Guanfeng [1 ]
Zhao, Lei [1 ]
Zhou, Xiaofang [3 ]
机构
[1] Soochow Univ, Suzhou, Peoples R China
[2] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
[3] Univ Queensland, Brisbane, Qld, Australia
来源
DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I | 2017年 / 10177卷
关键词
Recommender systems; Privacy-preserving; Differential privacy; Randomized perturbation;
D O I
10.1007/978-3-319-55753-3_36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy risks of recommender systems have caused increasing attention. Users' private data is often collected by probably untrusted recommender system in order to provide high-quality recommendation. Meanwhile, malicious attackers may utilize recommendation results to make inferences about other users' private data. Existing approaches focus either on keeping users' private data protected during recommendation computation or on preventing the inference of any single user's data from the recommendation result. However, none is designed for both hiding users' private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP) with randomized perturbation (RP). We theoretically show the noise added by RP has limited effect on recommendation accuracy and the noise added by DP can be well controlled based on the sensitivity analysis of functions on the perturbed data. Extensive experiments on three large-scale real world datasets show that the hybrid approach generally provides more privacy protection with acceptable recommendation accuracy loss, and surprisingly sometimes achieves better privacy without sacrificing accuracy, thus validating its feasibility in practice.
引用
收藏
页码:576 / 591
页数:16
相关论文
共 18 条
[1]  
[Anonymous], USENIX SEC S
[2]  
[Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security
[3]  
[Anonymous], 2017, SCI CHINA INFORM SCI, DOI DOI 10.1007/S11432-015-0981-4
[4]   A Practical Privacy-Preserving Recommender System [J].
Badsha, Shahriar ;
Yi, Xun ;
Khalil, Ibrahim .
DATA SCIENCE AND ENGINEERING, 2016, 1 (03) :161-177
[5]   Scalable collaborative-filtering with jointly derived neighborhood interpolation weights [J].
Bell, Robert M. ;
Koren, Yehuda .
ICDM 2007: PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2007, :43-52
[6]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[7]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]   Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing [J].
Erkin, Zekeriya ;
Veugen, Thijs ;
Toft, Tomas ;
Lagendijk, Reginald L. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1053-1066
[10]   D2P: Distance-Based Differential Privacy in Recommenders [J].
Guerraoui, Rachid ;
Kermarrec, Anne-Marie ;
Patra, Rhicheek ;
Taziki, Mahsa .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2015, 8 (08) :862-873