Utility-Based Differentially Private Recommendation System

被引:3
作者
Selvaraj, Sangeetha [1 ]
Sadasivam, Sudha G. [2 ]
Latha, R. [3 ]
机构
[1] PSG Coll Technol, Dept Informat Technol, Coimbatore 641004, Tamil Nadu, India
[2] PSG Coll Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
[3] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, Tamil Nadu, India
关键词
alternating least square; data sparsity; differential privacy; l injection; matrix factorization; recommendation system; unbounded differential privacy; MATRIX FACTORIZATION;
D O I
10.1089/big.2020.0038
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Recommendation system relies on feedback and personal information collected from users for effective recommendation. The success of a recommendation system is highly dependent on storing and managing sensitive customer information. Users refrain from using the application if there is a threat to user privacy. Several works that were performed to protect user privacy have paid little attention to utility. Hence, there is a need for a robust recommendation system with high accuracy and privacy. Model-based approaches are more prevalent and commonly used in recommendation. The proposed work improvises the existing private model-based collaborative filtering algorithm with high privacy and utility. We identified that data sparsity is the primary reason for most of the threats in a recommender framework through an extensive literature survey. Hence, our approach combines the l injection for imputing the missing ratings, which are deemed low, with differential privacy. We additionally introduce a random differential privacy approach to alternating least square (ALS) for improved utility. Experimental results on benchmarked datasets confirm that the performance of our private noisy Random ALS algorithm outperforms the non-noisy ALS for all datasets.
引用
收藏
页码:203 / 218
页数:16
相关论文
共 32 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], 2006, LECT NOTES COMPUTER
[3]   Privacy Preserving User-based Recommender System [J].
Badsha, Shahriar ;
Yi, Xun ;
Khalil, Ibrahim ;
Bertino, Elisa .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :1074-1083
[4]  
Berlioz A., 2015, P 9 ACM C REC SYST S, DOI DOI 10.1145/2792838.2800173
[5]   "You Might Also Like:" Privacy Risks of Collaborative Filtering [J].
Calandrino, Joseph A. ;
Kilzer, Ann ;
Narayanan, Arvind ;
Felten, Edward W. ;
Shmatikov, Vitaly .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :231-246
[6]   Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis [J].
Chakraborty, Parthasarathi ;
Karforma, Sunil .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :963-969
[7]  
Chaudhuri K, 2011, J MACH LEARN RES, V12, P1069
[8]   A Survey of Collaborative Filtering-Based Recommender Systems: From Traditional Methods to Hybrid Methods Based on Social Networks [J].
Chen, Rui ;
Hua, Qingyi ;
Chang, Yan-Shuo ;
Wang, Bo ;
Zhang, Lei ;
Kong, Xiangjie .
IEEE ACCESS, 2018, 6 :64301-64320
[9]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[10]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333