Efficient Privacy-Enhanced Familiarity-Based Recommender System

Recommender systems can help users to find interesting content, often based on similarity with other users. However, studies have shown that in some cases familiarity gives comparable results to similarity. Using familiarity has the added bonus of increasing privacy between users and utilizing a smaller dataset. In this paper, we propose an efficient privacy-enhanced recommender system that is based on familiarity. It is built on top of any given social network (without changing its behaviour) that already has information about the social relations between users. Using secure multi-party computation techniques and somewhat homomorphic encryption the privacy of the users can be ensured, assuming honest-but-curious participants. Two different solutions are given, one where all users are online, and another where most users are offline. Initial results on a prototype and a dataset of 50 familiar users and 1000 items show a recommendation time of four minutes for the solution with online users and of five minutes for the solution with offline users.

[1]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[2]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[3]  Tanja Lange,et al.  Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings , 2010, AFRICACRYPT.

[4]  Kristina Lerman,et al.  Social Networks and Social Information Filtering on Digg , 2006, ICWSM.

[5]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[6]  Judith Masthoff,et al.  In pursuit of satisfaction and the prevention of embarrassment: affective state in group recommender systems , 2006, User Modeling and User-Adapted Interaction.

[7]  Robert H. Deng,et al.  Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.

[8]  Pieter H. Hartel,et al.  Privacy-preserving collaborative filtering based on horizontally partitioned dataset , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[9]  Elisabeth Oswald,et al.  A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework , 2011, CRYPTO.

[10]  Chris Peikert,et al.  Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.

[11]  John Riedl,et al.  An algorithmic framework for performing collaborative filtering , 1999, SIGIR '99.

[12]  Ilya Mironov,et al.  Differentially private recommender systems: building privacy into the net , 2009, KDD.

[13]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[14]  Ronald Cramer,et al.  Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.

[15]  Zekeriya Erkin,et al.  Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Georg Groh,et al.  Recommendations in taste related domains: collaborative filtering vs. social filtering , 2007, GROUP.

[17]  Oded Goldreich,et al.  Foundations of Cryptography - A Primer , 2005, Found. Trends Theor. Comput. Sci..

[18]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[19]  Ido Guy,et al.  Personalized recommendation of social software items based on social relations , 2009, RecSys '09.

[20]  Jaideep Vaidya,et al.  Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor , 2011, J. Internet Serv. Inf. Secur..

[21]  Kathleen M. Carley,et al.  Cognitive inconsistencies and non-symmetric friendship , 1996 .

[22]  Benoît Libert,et al.  Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption , 2008, Public Key Cryptography.

[23]  Rashmi R. Sinha,et al.  Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.

[24]  Chris Cornelis,et al.  Trust and Recommendations , 2011, Recommender Systems Handbook.

[25]  Mihhail Matskin,et al.  Achieving Optimal Privacy in Trust-Aware Social Recommender Systems , 2010, SocInfo.

[26]  Nitesh V. Chawla,et al.  A Private and Reliable Recommendation System for Social Networks , 2010, 2010 IEEE Second International Conference on Social Computing.

[27]  Ashwin Machanavajjhala,et al.  Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..

[28]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[29]  Aggelos Kiayias,et al.  Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings , 2011, CT-RSA.

[30]  Reza Shokri,et al.  Preserving privacy in collaborative filtering through distributed aggregation of offline profiles , 2009, RecSys '09.

[31]  Nitesh V. Chawla,et al.  Reliable medical recommendation systems with patient privacy , 2010, IHI 2010.