LSH-based private data protection for service quality with big range in distributed educational service recommendations

Service recommendation has become a promising way to extract useful or valuable information from big educational data collected by various sensors and distributed in different platforms. How to protect the private user data in each cluster during recommendation processes is an interesting but challenging problem in the educational domain. A locality-sensitive hashing (LSH) technique has recently been employed to achieve the abovementioned privacy-preservation goal. However, traditional LSH-based recommendation approaches often suffer from low accuracy when the service quality data recruited in recommendations vary in a big range. Considering this drawback, we modify the traditional LSH technique in this paper to make it applicable to the service quality data with a big range, so as to pursue privacy-preserving and an accurate recommended list. Finally, a wide range of experiments are conducted based on the distributed dataset, i.e., WS-DREAM. Experiment results show that our approach can protect the private data in education (e.g., student information in universities) and performs better than other state-of-the-art ones in terms of accuracy and efficiency.

[1]  Han Yan,et al.  A Privacy Protection Model of Data Publication Based on Game Theory , 2018, Secur. Commun. Networks.

[2]  Xueliang Li,et al.  A σ3 type condition for heavy cycles in weighted graphs , 2001, Discuss. Math. Graph Theory.

[3]  Lan Huang,et al.  A Personalized QoS Prediction Approach for CPS Service Recommendation Based on Reputation and Location-Aware Collaborative Filtering , 2018, Sensors.

[4]  Ya-Nan Li,et al.  Recurrence Relations for the Linear Transformation Preserving the Strong q-Log-Convexity , 2016, Electron. J. Comb..

[5]  Shengli Zhao,et al.  Restricted profile estimation for partially linear models with large-dimensional covariates , 2017 .

[6]  Jiguo Yu,et al.  Time-Aware IoE Service Recommendation on Sparse Data , 2016, Mob. Inf. Syst..

[7]  Xuyun Zhang,et al.  Privacy-Preserving Distributed Service Recommendation Based on Locality-Sensitive Hashing , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[8]  Pingping Zhang,et al.  On a class of Volterra nonlinear equations of parabolic type , 2010, Appl. Math. Comput..

[9]  Xuyun Zhang,et al.  An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment , 2018, Sensors.

[10]  Fushan Li,et al.  Global existence uniqueness and decay estimates for nonlinear viscoelastic wave equation with boundary dissipation , 2011 .

[11]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[12]  Hao Li,et al.  A new sufficient condition for pancyclability of graphs , 2014, Discret. Appl. Math..

[13]  Lishan Liu,et al.  Positive solutions for nonlinear fractional semipositone differential equation with nonlocal boundary conditions , 2016 .

[14]  Shudi Yang,et al.  The weight distributions of two classes of p-ary cyclic codes with few weights , 2015, Finite Fields Their Appl..

[15]  Shudi Yang,et al.  A class of three-weight linear codes and their complete weight enumerators , 2016, Cryptography and Communications.

[16]  Yonghong Wu,et al.  Nontrivial solutions of singular fourth-order Sturm-Liouville boundary value problems with a sign-changing nonlinear term , 2011, Appl. Math. Comput..

[17]  Jinjun Chen,et al.  A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..

[18]  Fushan Li,et al.  Existence and uniqueness of positive solutions for some singular boundary value problems with linear functional boundary conditions , 2011 .

[19]  Lianyong Qi,et al.  Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[20]  Fanwei Meng,et al.  Some new nonlinear integral inequalities with weakly singular kernel and their applications to FDEs , 2015 .

[21]  Imran Memon,et al.  Authentication User’s Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services , 2015, Wirel. Pers. Commun..

[22]  Hanyu Li,et al.  Partial condition number for the equality constrained linear least squares problem , 2016, Calcolo.

[23]  Jiguo Yu,et al.  Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..

[24]  Shudi Yang,et al.  Complete Weight Enumerators of a Class of Linear Codes From Weil Sums , 2019, IEEE Access.

[25]  Junqing Cai,et al.  An implicit σ3 type condition for heavy cycles in weighted graphs , 2014, Ars Comb..

[26]  Guangbao Guo,et al.  Parallel tempering for dynamic generalized linear models , 2016 .

[27]  Aixia Qian,et al.  Sign-changing solutions for some nonlinear problems with strong resonance , 2011 .

[28]  Fushan Li,et al.  Uniform energy decay rates for nonlinear viscoelastic wave equation with nonlocal boundary damping , 2011 .

[29]  Yonghong Wu,et al.  Iterative solution for nonlinear impulsive advection- reaction-diffusion equations , 2016 .

[30]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[31]  Xiuhua Li,et al.  A Secure and Scalable Data Communication Scheme in Smart Grids , 2018, Wirel. Commun. Mob. Comput..

[32]  Li Shang,et al.  An algorithm for efficient privacy-preserving item-based collaborative filtering , 2016, Future Gener. Comput. Syst..

[33]  Mingqiu Wang,et al.  Adaptive Lasso estimators for ultrahigh dimensional generalized linear models , 2014 .

[35]  Mingqiu Wang,et al.  Adaptive group bridge estimation for high-dimensional partially linear models , 2017, Journal of inequalities and applications.

[36]  Maoan Han,et al.  Theory of rotated equations and applications to a population model , 2018 .

[37]  K. L. Shunmuganathan,et al.  Role of Agent Technology in Web Usage Mining: Homomorphic Encryption Based Recommendation for E-commerce Applications , 2016, Wirel. Pers. Commun..

[38]  Xiaoguang Wang,et al.  A note on the one-step estimator for ultrahigh dimensionality , 2014, J. Comput. Appl. Math..

[39]  Zibin Zheng,et al.  Investigating QoS of Real-World Web Services , 2014, IEEE Transactions on Services Computing.

[40]  Lishan Liu,et al.  Positive solutions for a class of fractional boundary value problem with changing sign nonlinearity , 2011 .

[41]  Pingrun Li Two classes of linear equations of discrete convolution type with harmonic singular operators , 2016 .

[42]  Xin-Fang Zhang,et al.  The strong convergence theorems for split common fixed point problem ofasymptotically nonexpansive mappings in Hilbert spaces , 2015 .

[43]  Dongdai Lin,et al.  Complete weight enumerators of two classes of linear codes , 2017, Discret. Math..

[44]  Dongdai Lin,et al.  Complete weight enumerators of a class of three-weight linear codes , 2017 .

[45]  Xuyun Zhang,et al.  Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation , 2018, IEEE Access.

[46]  Lou Caccetta,et al.  Entire large solutions for a class of Schrödinger systems with a nonlinear random operator , 2015 .

[47]  Yiming Zhang,et al.  SES-LSH: Shuffle-Efficient Locality Sensitive Hashing for Distributed Similarity Search , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[48]  Yuzhen Bai,et al.  Backward solutions to nonlinear integro-differential systems , 2010 .

[49]  Guo-Liang Tian,et al.  Variable selection in the high-dimensional continuous generalized linear model with current status data , 2014 .

[50]  Peihe Wang,et al.  Some geometrical properties of convex level sets of minimal graph on 2-dimensional Riemannian manifolds , 2016 .

[51]  Guo-Liang Tian,et al.  Robust group non-convex estimations for high-dimensional partially linear models , 2016 .

[52]  MULTIPLE POSITIVE SOLUTIONS FOR SECOND-ORDER THREE-POINT BOUNDARY-VALUE PROBLEMS WITH SIGN CHANGING NONLINEARITIES , 2012 .

[53]  Zibin Zheng,et al.  A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation , 2015, 2015 IEEE International Conference on Web Services.

[54]  Chuancun Yin,et al.  Uniform estimate for the tail probabilities of randomly weighted sums , 2014 .

[55]  Qiang He,et al.  Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..

[56]  Peihe Wang,et al.  The geometric properties of harmonic function on 2-dimensional Riemannian manifolds , 2014 .

[57]  Lily L. Liu Linear transformations preserving log-convexity , 2011, Ars Comb..

[58]  Mingqiu Wang,et al.  Variable selection for high-dimensional generalized linear models with the weighted elastic-net procedure , 2015 .

[59]  Patrice Ossona de Mendez,et al.  Restricted Frame Graphs and a Conjecture of Scott , 2014, Electron. J. Comb..

[60]  Fotis Foukalas,et al.  Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems , 2018, Sensors.

[61]  Zhaowen Zheng,et al.  Invariance of deficiency indices under perturbation for discrete Hamiltonian systems , 2013 .

[62]  Li Kuang,et al.  Predicting Short-Term Electricity Demand by Combining the Advantages of ARMA and XGBoost in Fog Computing Environment , 2018, Wirel. Commun. Mob. Comput..

[63]  Chuancun Yin,et al.  On Jensen’s inequality, Hölder’s inequality, and Minkowski’s inequality for dynamically consistent nonlinear evaluations , 2015 .

[64]  Maoan Han,et al.  Bifurcation of periodic orbits by perturbing high-dimensional piecewise smooth integrable systems , 2017 .

[65]  Chunming Tang,et al.  A construction of linear codes and their complete weight enumerators , 2017, Finite Fields Their Appl..

[66]  Bao-Xuan Zhu,et al.  Strong q-log-convexity of the Eulerian polynomials of Coxeter groups , 2014, Discret. Math..