Towards efficient privacy-preserving collaborative recommender systems

Recommender systems use various types of information to help customers find products of personalized interest. To increase the usefulness of recommender systems in certain circumstances, it could be desirable to merge recommender system databases between companies, thus expanding the data pool. This can lead to privacy disclosure hazards that this paper addresses by constructing an efficient privacy-preserving collaborative recommender system based on the scalar product protocol.

[1]  Justin Zhijun Zhan,et al.  Privacy-preserving collaborative data mining , 2007, IEEE Computational Intelligence Magazine.

[2]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[3]  David Heckerman,et al.  Empirical Analysis of Predictive Algorithms for Collaborative Filtering , 1998, UAI.

[4]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[5]  John F. Canny,et al.  Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.

[6]  Il Im,et al.  Does a one-size recommendation system fit all? the effectiveness of collaborative filtering based recommendation systems across different domains and search modes , 2007, TOIS.

[7]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[8]  Justin Zhan,et al.  Preserving Privacy in Joining Recommender Systems , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[9]  John Riedl,et al.  Recommender systems in e-commerce , 1999, EC '99.

[10]  Paul Resnick,et al.  Recommender systems , 1997, CACM.

[11]  Da-Wei Wang,et al.  Information-Theoretically Secure Number-Product Protocol , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[12]  Tsan-sheng Hsu,et al.  Toward Empirical Aspects of Secure Scalar Product , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[13]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[14]  Justin Zhan,et al.  Towards Empirical Aspects of Secure Scalar Product , 2008 .

[15]  Tsvi Kuflik,et al.  Enhancing privacy and preserving accuracy of a distributed collaborative filtering , 2007, RecSys '07.