Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing

被引:149
作者
Erkin, Zekeriya [1 ]
Veugen, Thijs [1 ,2 ]
Toft, Tomas [3 ]
Lagendijk, Reginald L. [1 ]
机构
[1] Delft Univ Technol, Dept Intelligent Syst, Informat Secur & Privacy Lab, NL-2628 CD Delft, Netherlands
[2] TNO, NL-2600 GB Delft, Netherlands
[3] Aarhus Univ, Dept Comp Sci, DK-8200 Aarhus, Denmark
关键词
Homomorphic encryption; privacy; recommender systems; secure multiparty computation;
D O I
10.1109/TIFS.2012.2190726
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recommender systems have become an important tool for personalization of online services. Generating recommendations in online services depends on privacy-sensitive data collected from the users. Traditional data protection mechanisms focus on access control and secure transmission, which provide security only against malicious third parties, but not the service provider. This creates a serious privacy risk for the users. In this paper, we aim to protect the private data against the service provider while preserving the functionality of the system. We propose encrypting private data and processing them under encryption to generate recommendations. By introducing a semitrusted third party and using data packing, we construct a highly efficient system that does not require the active participation of the user. We also present a comparison protocol, which is the first one to the best of our knowledge, that compares multiple values that are packed in one encryption. Conducted experiments show that this work opens a door to generate private recommendations in a privacy-preserving manner.
引用
收藏
页码:1053 / 1066
页数:14
相关论文
共 31 条
[1]   Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions [J].
Adomavicius, G ;
Tuzhilin, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (06) :734-749
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[4]  
[Anonymous], 2008, IACR CRYPTOLOGY EPRI
[5]  
Atallah Mikhail, 2004, P 2004 ACM WORKSH PR, P103, DOI DOI 10.1145/1029179.1029204
[6]   Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :180-187
[7]  
Blake I.F., 1999, ELLIPTIC CURVES CRYP
[8]  
Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
[9]  
Canny J., 2002, Proceedings of SIGIR 2002. Twenty-Fifth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, P238, DOI 10.1145/564376.564419
[10]   Collaborative filtering with privacy [J].
Canny, J .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :45-57