A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case

User profiling is the process of collecting information about a user in order to construct their profile. The information in a user profile may include various attributes of a user such as geographical location, academic and professional background, membership in groups, interests, preferences, opinions, etc. Big data techniques enable collecting accurate and rich information for user profiles, in particular due to their ability to process unstructured as well as structured information in high volumes from multiple sources. Accurate and rich user profiles are important for applications such as recommender systems, which try to predict elements that a user has not yet considered but may find useful. The information contained in user profiles is personal and thus there are privacy issues related to user profiling. In this position paper, we discuss user profiling with big data techniques and the associated privacy challenges. We also discuss the ongoing EU-funded EEXCESS project as a concrete example of constructing user profiles with big data techniques and the approaches being considered for preserving user privacy.

[1]  Nishchol Mishra,et al.  Privacy in Social Networks : A Survey , 2013 .

[2]  Li Shang,et al.  Pistis: A Privacy-Preserving Content Recommender System for Online Social Communities , 2011, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[3]  M. Berthold,et al.  International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems , 1998 .

[4]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[5]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[6]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[7]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[8]  J. Manyika Big data: The next frontier for innovation, competition, and productivity , 2011 .

[9]  Rathindra Sarathy,et al.  Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data , 2011, Trans. Data Priv..

[10]  Analía Amandi,et al.  Intelligent User Profiling , 2009, Artificial Intelligence: An International Perspective.

[11]  Florian Kerschbaum,et al.  A verifiable, centralized, coercion-free reputation system , 2009, WPES '09.

[12]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[13]  Elisa Bertino,et al.  Preserving privacy of feedback providers in decentralized reputation systems , 2012, Comput. Secur..

[14]  D. Song,et al.  Signatures of Reputation : Towards Trust Without Identity , 2010 .

[15]  Anne-Marie Kermarrec,et al.  Privacy-preserving distributed collaborative filtering , 2016, Computing.

[16]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[17]  Elisa Bertino,et al.  A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model , 2013, IEEE Transactions on Information Forensics and Security.