A privacy-preserving mobile application recommender system based on trust evaluation

Abstract Too many mobile applications in App stores results in information overload in App market. Mobile users are confused in choosing suitable and trustworthy mobile applications due to a large number of available candidates. A mobile application recommender system is a powerful tool that helps users solve this problem. However, there are few feasible recommender systems focusing on recommending mobile applications in the literature. First, few researches study user trust behavior based recommendation on mobile applications. Second, the accuracy and personalization of existing recommender systems need to be further improved. Particularly, privacy preservation is still an open issue in mobile application recommendation. In this paper, we propose two privacy-preserving mobile application recommendation schemes based on trust evaluation. Recommendations on mobile application are generated based on user trust behaviors of mobile application usage. In these two schemes, user private data can be preserved by applying our proposed security protocols and utilizing homomorphic encryption. We further implement two schemes and develop two mobile Apps that can be applied in different scenarios, i.e., a centralized cloud service and distributed social networking. Security analysis, performance evaluation and simulation results show that our schemes have sound security, efficiency, accuracy, and robustness.

[1]  Vijay Varadharajan,et al.  MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.

[2]  Bracha Shapira,et al.  Recommender Systems Handbook , 2015, Springer US.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Hui Xiong,et al.  Structural Analysis of User Choices for Mobile App Recommendation , 2016, ACM Trans. Knowl. Discov. Data.

[5]  Michelle X. Zhou,et al.  Introduction to the Special Issue on Recommender System Benchmarking , 2016, ACM Trans. Intell. Syst. Technol..

[6]  Yue Shen,et al.  PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.

[7]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[8]  Robert H. Deng,et al.  Encrypted data processing with Homomorphic Re-Encryption , 2017, Inf. Sci..

[9]  Lei Xue,et al.  Toward Automatically Generating Privacy Policy for Android Apps , 2017, IEEE Transactions on Information Forensics and Security.

[10]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[11]  Enhong Chen,et al.  Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis , 2018, IEEE Transactions on Mobile Computing.

[12]  Yue Shen,et al.  A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..

[13]  Yuguang Fang,et al.  A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[14]  Jiannong Cao,et al.  AppBooster: Boosting the Performance of Interactive Mobile Applications with Computation Offloading and Parameter Tuning , 2017, IEEE Transactions on Parallel and Distributed Systems.

[15]  Zheng Yan,et al.  Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature , 2017, IEEE Access.

[16]  Begoña García Zapirain,et al.  Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide , 2016, Journal of Medical Systems.

[17]  Yan Zheng,et al.  Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.

[18]  Cong Wang,et al.  An Interactive Trust Model for Application Market of the Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[19]  Hongyan Liu,et al.  Mining Exploratory Behavior to Improve Mobile App Recommendations , 2017, ACM Trans. Inf. Syst..

[20]  George Angelos Papadopoulos,et al.  Ubiquitous recommender systems , 2013, Computing.

[21]  Di Wu,et al.  Recommender system for mobile users , 2017, Multimedia Tools and Applications.

[22]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[23]  Bing Wu,et al.  A Survey of Collaborative Filtering-Based Recommender Systems for Mobile Internet Applications , 2016, IEEE Access.

[24]  Bin Guo,et al.  A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection , 2019, Multimedia Tools and Applications.

[25]  Robert H. Deng,et al.  TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications , 2011, Personal and Ubiquitous Computing.

[26]  Zekeriya Erkin,et al.  Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Lin Zhang,et al.  Learning Geographical and Mobility Factors for Mobile Application Recommendation , 2017, IEEE Intelligent Systems.

[28]  Hengrun Zhang,et al.  A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.

[29]  Isabel de la Torre Díez,et al.  Privacy and Security in Mobile Health Apps: A Review and Recommendations , 2014, Journal of Medical Systems.

[30]  Bo Cheng,et al.  MobiGemini: sensitive-based data and resource protection framework for mobile device , 2017, China Communications.

[31]  Elisa Bertino,et al.  Android User Privacy Preserving Through Crowdsourcing , 2018, IEEE Transactions on Information Forensics and Security.

[32]  Pallapa Venkataram,et al.  Performance Analysis of Privacy Protection System During Data Transfer in MANETs , 2018, Int. J. Wirel. Inf. Networks.

[33]  Jianqiang Li,et al.  Enforcing Differential Privacy for Shared Collaborative Filtering , 2017, IEEE Access.

[34]  Athanasios V. Vasilakos,et al.  Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..

[35]  Shin-Yan Chiou,et al.  A trustworthy online recommendation system based on social connections in a privacy-preserving manner , 2017, Multimedia Tools and Applications.

[36]  Jun Zou,et al.  A Belief Propagation Approach to Privacy-Preserving Item-Based Collaborative Filtering , 2015, IEEE Journal of Selected Topics in Signal Processing.

[37]  Seungmin Rho,et al.  Privacy aware group based recommender system in multimedia services , 2017, Multimedia Tools and Applications.

[38]  Elio Masciari,et al.  Discovering User Behavioral Features to Enhance Information Search on Big Data , 2017, ACM Trans. Interact. Intell. Syst..

[39]  Ibrahim Khalil,et al.  A Practical Privacy-Preserving Recommender System , 2016, Data Science and Engineering.

[40]  Robert H. Deng,et al.  Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.

[41]  Lei Cen,et al.  Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference , 2015, WSDM.

[42]  Aleksandr Ometov,et al.  Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges , 2017, IEEE Access.

[43]  Shunxiang Wu,et al.  Cross-Platform App Recommendation by Jointly Modeling Ratings and Texts , 2017, ACM Trans. Inf. Syst..

[44]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[45]  Raimo Kantola,et al.  A Review of Homomorphic Encryption and its Applications , 2016, MobiMedia.

[46]  Lei Zou,et al.  Context-Aware Recommendation Using Role-Based Trust Network , 2015, ACM Trans. Knowl. Discov. Data.

[47]  Isabela Gasparini,et al.  A systematic mapping on adaptive recommender approaches for ubiquitous environments , 2018, Computing.

[48]  Francesco Ricci,et al.  Mobile Recommender Systems , 2010, J. Inf. Technol. Tour..

[49]  Avi Arampatzis,et al.  Suggesting Points-of-Interest via Content-Based, Collaborative, and Hybrid Fusion Methods in Mobile Devices , 2017, ACM Trans. Inf. Syst..

[50]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..