Feature selection by using privacy-preserving of recommendation systems based on collaborative filtering and mutual trust in social networks

Given the increasing growth of the Web and consequently the growth of e-commerce, the amount of data which users face are increasing day by day. Therefore, one of the key issues in today’s world is the extraction of knowledge from a large database. The recommendation systems are able to extract useful information from large databases. The information extracted by the recommendation systems may breach the privacy-preserving of individuals and increase the error rate. Concerns will grow along with the increasing privacy breaches, which are done by recommendation systems. In recent years, researchers have provided a variety of techniques for privacy-preserving and reduced error rates in recommendation systems. But most of these methods have not offered good solutions for privacy-preserving issues and reducing error rates. The aim of the proposed method is to provide a solution for users’ security concerns in common filtering systems with reduced error rates and more privacy preservation. In this article, we propose a privacy-preserving method for recommendation systems called PRS, which first uses an anonymous method to convert secondary data without user identification information. The existing trust data are measured in terms of resemblance and trust-weighted criterion and then converted from perturbation-based chaos to confidential data. Finally, these two algorithms have been used for clustering the data: fuzzy c-ordered means and particle swarm optimization. The results of experiments have been compared with state-of-the-art methods, which show the superiority of the proposed method in terms of classification error rates and privacy-preserving.

[1]  Huseyin Polat,et al.  A scalable privacy-preserving recommendation scheme via bisecting k-means clustering , 2013, Inf. Process. Manag..

[2]  Josep Domingo-Ferrer,et al.  A k-anonymous approach to privacy preserving collaborative filtering , 2015, J. Comput. Syst. Sci..

[3]  Ajith Abraham,et al.  Fuzzy C-means and fuzzy swarm for fuzzy clustering problem , 2011, Expert Syst. Appl..

[4]  Jiming Liu,et al.  Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Social Collaborative Filtering by Trust , 2022 .

[5]  Yanchun Zhang,et al.  Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system , 2013, World Wide Web.

[6]  Tianqing Zhu,et al.  Private collaborative filtering under untrusted recommender server , 2020, Future Gener. Comput. Syst..

[7]  Shin-Yan Chiou,et al.  A trustworthy online recommendation system based on social connections in a privacy-preserving manner , 2017, Multimedia Tools and Applications.

[8]  Zhigang Luo,et al.  A Hybrid Item-based Recommendation Algorithm against Segment Attack in Collaborative Filtering Systems , 2011, 2011 International Conference on Information Management, Innovation Management and Industrial Engineering.

[9]  J. Bobadilla,et al.  Recommender systems survey , 2013, Knowl. Based Syst..

[10]  Jyh-Ren Shieh An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[11]  B. John Oommen,et al.  A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases , 2010 .

[12]  Jacek M. Leski,et al.  Fuzzy c-ordered-means clustering , 2016, Fuzzy Sets Syst..

[13]  Shalini Batra,et al.  An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system , 2018, Future Gener. Comput. Syst..

[14]  Kaustubh Patil,et al.  Multi-Layer Perceptron Classifier and Paillier Encryption Scheme for Friend Recommendation System , 2017, 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA).

[15]  Maitreyee Dutta,et al.  A Novel Way of Assigning Software Bug Priority Using Supervised Classification on Clustered Bugs Data , 2014, ISI.

[16]  Elisa Bertino,et al.  A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.

[17]  Jianqiang Wang,et al.  A Linguistic Intuitionistic Cloud Decision Support Model with Sentiment Analysis for Product Selection in E-commerce , 2019, Int. J. Fuzzy Syst..

[18]  Fuguo Zhang Average Shilling Attack against Trust-Based Recommender Systems , 2009, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering.

[19]  Fuguo Zhang Analysis of Love-Hate Shilling Attack Against E-commerce Recommender System , 2010, 2010 International Conference of Information Science and Management Engineering.

[20]  Yanchun Zhang,et al.  Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers , 2009, Inf. Syst..

[21]  Yuguang Fang,et al.  A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[22]  Xiao Liu,et al.  When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System , 2017, DASFAA.

[23]  Han Xiong,et al.  A novel recommendation algorithm frame for tourist Spots based on multi-clustering bipartite graphs , 2017, 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).

[24]  Jianqiang Li,et al.  Enforcing Differential Privacy for Shared Collaborative Filtering , 2017, IEEE Access.

[25]  Huiqun Yu,et al.  A Complete (alpha,k)-Anonymity Model for Sensitive Values Individuation Preservation , 2008, 2008 International Symposium on Electronic Commerce and Security.

[26]  Ning Zhang,et al.  An Improved Privacy-Preserving Collaborative Filtering Recommendation Algorithm , 2014, PACIS.

[27]  Adriano Lorena Inácio de Oliveira,et al.  Hybrid methods for fuzzy clustering based on fuzzy c-means and improved particle swarm optimization , 2015, Expert Syst. Appl..

[28]  Laura S Storch,et al.  Revisiting the logistic map: A closer look at the dynamics of a classic chaotic population model with ecologically realistic spatial structure and dispersal. , 2017, Theoretical population biology.

[29]  Javad Hamidzadeh,et al.  Belief-based chaotic algorithm for support vector data description , 2019, Soft Comput..

[30]  Zekeriya Erkin,et al.  Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.

[31]  Tsan-sheng Hsu,et al.  Privacy-Preserving Collaborative Recommender Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[32]  S. Strogatz Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry and Engineering , 1995 .

[33]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[34]  Saeid Homayouni,et al.  Object-based classification of hyperspectral data using Random Forest algorithm , 2018, Geo spatial Inf. Sci..

[35]  John F. Canny,et al.  Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.

[36]  Albert Y. Zomaya,et al.  TBRS: A trust based recommendation scheme for vehicular CPS network , 2019, Future Gener. Comput. Syst..

[37]  Songjie Gong,et al.  Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation , 2011 .

[38]  Haralambos Mouratidis,et al.  A Method for Privacy-preserving Collaborative Filtering Recommendations , 2017, J. Univers. Comput. Sci..

[39]  Le Wang,et al.  The differences in hotel selection among various types of travellers: A comparative analysis with a useful bounded rationality behavioural decision support model , 2020 .

[40]  Hiroaki Kikuchi,et al.  Privacy-preserving Collaborative Filtering Using Randomized Response , 2013, J. Inf. Process..

[41]  Jianfeng Ma,et al.  APPLET: a privacy-preserving framework for location-aware recommender system , 2017, Science China Information Sciences.

[42]  Bin Guo,et al.  A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection , 2019, Multimedia Tools and Applications.

[43]  Tianqing Zhu,et al.  Privacy preserving collaborative filtering for KNN attack resisting , 2014, Social Network Analysis and Mining.

[44]  Javad Hamidzadeh,et al.  Weighted support vector data description based on chaotic bat algorithm , 2017, Appl. Soft Comput..

[45]  Javad Hamidzadeh,et al.  Automatic support vector data description , 2016, Soft Computing.

[46]  Jordi Forné,et al.  p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation , 2017, Inf. Sci..

[47]  John Riedl,et al.  Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems , 2006, ETRICS.

[48]  Li Shang,et al.  An algorithm for efficient privacy-preserving item-based collaborative filtering , 2016, Future Gener. Comput. Syst..

[49]  Josep Domingo-Ferrer,et al.  A Genetic Approach to Multivariate Microaggregation for Database Privacy , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[50]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[51]  Mahmood Alborzi,et al.  Big data clustering with varied density based on MapReduce , 2019, Journal of Big Data.

[52]  Haralambos Mouratidis,et al.  Privacy-preserving collaborative recommendations based on random perturbations , 2017, Expert Syst. Appl..

[53]  Huseyin Polat,et al.  Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.

[54]  Jianfeng Ma,et al.  ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks , 2018, Future Gener. Comput. Syst..

[55]  Jianqiang Wang,et al.  A Fuzzy Decision Support Model With Sentiment Analysis for Items Comparison in e-Commerce: The Case Study of http://PConline.com , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[56]  Rongxing Lu,et al.  A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment , 2017, IFIPTM.

[57]  Jun Cao,et al.  A novel image segmentation approach for wood plate surface defect classification through convex optimization , 2017, Journal of Forestry Research.

[58]  B. Alatas,et al.  Chaos embedded particle swarm optimization algorithms , 2009 .

[59]  Gaurang Panchal,et al.  Data Security in Recommendation System Using Homomorphic Encryption , 2017 .

[60]  Sunil Karforma,et al.  Detection of Profile-injection Attacks in Recommender Systems Using Outlier Analysis , 2013 .