Privacy-aware smart city: A case study in collaborative filtering recommender systems

Ensuring privacy in recommender systems for smart cities remains a research challenge, and in this paper we study collaborative filtering recommender systems for privacy-aware smart cities. Specifically, we use the rating matrix to establish connections between a privacy-aware smart city and κ-coRating, a novel privacy-preserving rating data publishing model. First, we model privacy concerns in a smart city as the problem of privacy-preserving collaborative filtering recommendation. Then, we introduce κ-coRating to address privacy concerns in published rating matrices, by filling the null ratings with predicted scores. This allows us to mask the original ratings to preserve κ-anonymity-like data privacy, and enhance data utility (quantified using prediction accuracy in this paper). We show that the optimal κ-coRated mapping is an NP-hard problem and design an efficient greedy algorithm to achieve κ-coRating. We then demonstrate the utility of our approach empirically.

[1]  Benjamin C. M. Fung,et al.  Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data , 2014, IEEE Transactions on Dependable and Secure Computing.

[2]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[3]  Albert Y. Zomaya,et al.  Parallel Processing of Dynamic Continuous Queries over Streaming Data Flows , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  Alfredo De Santis,et al.  A triadic closure and homophily-based recommendation system for online social networks , 2015, World Wide Web.

[5]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[6]  Albert Y. Zomaya,et al.  Big Data Privacy in the Internet of Things Era , 2014, IT Professional.

[7]  Shiyan Hu,et al.  A Computing Perspective on Smart City [Guest Editorial] , 2016, IEEE Trans. Computers.

[8]  Chris Clifton,et al.  Privacy Preserving Data Mining (Advances in Information Security) , 2005 .

[9]  Viggo Kann,et al.  Maximum Bounded H-Matching is MAX SNP-Complete , 1994, Inf. Process. Lett..

[10]  Chunming Rong,et al.  Fast algorithms to evaluate collaborative filtering recommender systems , 2016, Knowl. Based Syst..

[11]  Min Wang,et al.  A Parallel Adaboost-Backpropagation Neural Network for Massive Image Dataset Classification , 2016, Scientific Reports.

[12]  Kim-Kwang Raymond Choo,et al.  Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.

[13]  Aniello Castiglione,et al.  Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner , 2017, Comput. Secur..

[14]  Qi Wang,et al.  Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.

[15]  Jemal H. Abawajy,et al.  Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.

[16]  Albert Y. Zomaya,et al.  Privacy-Knowledge Modeling for the Internet of Things: A Look Back , 2016, Computer.

[17]  Ciprian Dobre,et al.  Controlling and filtering users data in Intelligent Transportation System , 2018, Future Gener. Comput. Syst..

[18]  Silvia Rossi,et al.  An Architecture for a Mobility Recommender System in Smart Cities , 2016, EUSPN/ICTH.

[19]  Laurence T. Yang,et al.  Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning , 2016, IEEE Transactions on Computers.

[20]  Kun Liu,et al.  Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[21]  Jemal H. Abawajy,et al.  Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..

[22]  Camille Rosenthal-Sabroux,et al.  Recommendations to Improve the Smartness of a City , 2014 .

[23]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[24]  Albert Y. Zomaya,et al.  A Parallel File System with Application-Aware Data Layout Policies for Massive Remote Sensing Image Processing in Digital Earth , 2015, IEEE Transactions on Parallel and Distributed Systems.

[25]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[26]  Hans-Peter Kriegel,et al.  A Fast Parallel Clustering Algorithm for Large Spatial Databases , 1999, Data Mining and Knowledge Discovery.

[27]  Tsuyoshi Takagi,et al.  Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..

[28]  Charles Elkan,et al.  Differential privacy based on importance weighting , 2013, Machine Learning.

[29]  Christian Esposito,et al.  Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design , 2017, Future Gener. Comput. Syst..

[30]  Rongxing Lu,et al.  Securing the Internet of Things in a Quantum World , 2017, IEEE Communications Magazine.

[31]  Albert Y. Zomaya,et al.  Distribution Based Workload Modelling of Continuous Queries in Clouds , 2017, IEEE Transactions on Emerging Topics in Computing.

[32]  Agusti Solanas,et al.  The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.

[33]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).