Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing

被引:8
作者
Li, Tao [1 ]
Qian, Qi [2 ]
Ren, Yongjun [3 ]
Ren, Yongzhen [2 ]
Xia, Jinyue [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Coll Artificial Intelligence, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Coll Elect & Informat Engn, Nanjing 210044, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Coll Comp & Software, Nanjing 210044, Peoples R China
[4] Int Business Machines Corp IBM, Armonk, NY USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 66卷 / 01期
基金
中国国家自然科学基金;
关键词
IoT; kernel method; privacy-preserving; personalized recommendation; random perturbation; NONNEGATIVE MATRIX FACTORIZATION;
D O I
10.32604/cmc.2020.010424
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application field of the Internet of Things (IoT) involves all aspects, and its application in the fields of industry, agriculture, environment, transportation, logistics, security and other infrastructure has effectively promoted the intelligent development of these aspects. Although the IoT has gradually grown in recent years, there are still many problems that need to be overcome in terms of technology, management, cost, policy, and security. We need to constantly weigh the benefits of trusting IoT products and the risk of leaking private data. To avoid the leakage and loss of various user data, this paper developed a hybrid algorithm of kernel function and random perturbation method based on the algorithm of non-negative matrix factorization, which realizes personalized recommendation and solves the problem of user privacy data protection in the process of personalized recommendation. Compared to non-negative matrix factorization privacy-preserving algorithm, the new algorithm does not need to know the detailed information of the data, only need to know the connection between each data; and the new algorithm can process the data points with negative characteristics. Experiments show that the new algorithm can produce recommendation results with certain accuracy under the premise of preserving users' personal privacy.
引用
收藏
页码:779 / 791
页数:13
相关论文
共 45 条
[1]  
Alexandridis G., 2017, DATA MIN KNOWL DISC, V31, P1
[2]  
[Anonymous], 2019, COMPUT SYST SCI ENG
[3]  
Asaei A, 2015, INT CONF ACOUST SPEE, P2694, DOI 10.1109/ICASSP.2015.7178460
[4]  
Badsha S., 2018, IEEE T SERVICES COMP
[5]   Privacy Preserving User-based Recommender System [J].
Badsha, Shahriar ;
Yi, Xun ;
Khalil, Ibrahim ;
Bertino, Elisa .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :1074-1083
[6]  
Casalino G, 2016, SIGNALS COMMUN TECHN, P49, DOI 10.1007/978-3-662-48331-2_2
[7]   RETRACTED: The visual object tracking algorithm research based on adaptive combination kernel (Retracted Article) [J].
Chen, Yuantao ;
Wang, Jin ;
Xia, Runlong ;
Zhang, Qian ;
Cao, Zhouhong ;
Yang, Kai .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (12) :4855-4867
[8]   Prioritizing and Scheduling Service Requests under Time Constraints [J].
Dargahi, Farnaz ;
Bhuiyan, Mohammad F. H. ;
Wang, Chun ;
Ding, Chen .
2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, :1-8
[9]  
Fan SP, 2018, 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), P45, DOI 10.1109/ICCCBDA.2018.8386485
[10]  
Gupta J, 2014, 2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA), P300, DOI 10.1109/CSCITA.2014.6839276