SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System

被引:16
作者
Chen, Jinrong [1 ]
Liu, Lin [1 ]
Chen, Rongmao [1 ]
Peng, Wei [1 ]
Huang, Xinyi [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Cryptography; Tensors; Additives; Data privacy; Security; Computational modeling; Privacy-preserving outsourcing; tensor decomposition; outsourced data security and privacy; additive secret sharing; SECURE TENSOR DECOMPOSITION; SERVICE RECOMMENDATION; FRAMEWORK;
D O I
10.1109/TDSC.2021.3085562
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Context-aware recommendation systems are of increasing popularity in the digital era to recommend personalized items to users. However, how to ensure user data privacy while remaining high recommendation accuracy is widely considered a challenge. In this work, we propose a privacy-preserving method for the context-aware recommendation system in the two-cloud model. In particular, we first adjust the standard additive secret sharing scheme to support secure negative integers computation, based on which we manage to design secure comparison protocol and division protocols that enjoy desirable security and efficiency. By using these new protocols, we propose a secure and efficient context-aware recommendation system that also supports offline users. Compared with the state-of-the-art, our scheme achieves stronger data privacy preservation by further protecting the intermediate data calculated during the system training. Experimental results on real-world datasets indicate that our scheme is efficient. Notable, our system could achieve more significant performance improvement by running the underlying schemes in parallel.
引用
收藏
页码:3168 / 3182
页数:15
相关论文
共 61 条
[1]  
[Anonymous], 1959, IRE Trans. Electr. Comput.
[2]  
[Anonymous], 2013, FC
[3]   Privacy Preserving User Based Web Service Recommendations [J].
Badsha, Shahriar ;
Yi, Xun ;
Khalil, Ibrahim ;
Liu, Dongxi ;
Nepal, Surya ;
Lam, Kwok-Yan .
IEEE ACCESS, 2018, 6 :56647-56657
[4]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[5]   High-performance secure multi-party computation for data mining applications [J].
Bogdanov, Dan ;
Niitsoo, Margus ;
Toft, Tomas ;
Willemson, Jan .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (06) :403-418
[6]  
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
[7]  
Chen Gao, 2019, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, V3, DOI 10.1145/3314398
[8]   SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition [J].
Chen, Jinrong ;
Liu, Lin ;
Chen, Rongmao ;
Peng, Wei .
INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 :309-329
[9]  
Chen X., 2019, WIREL COMMUN MOBILE, V2019
[10]   Secure Similar Sequence Query on Outsourced Genomic Data [J].
Cheng, Ke ;
Hou, Yantian ;
Wang, Liangmin .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :237-251