Privacy preserving collaborative filtering for SaaS enabling PaaS clouds

AbstractRecommender systems use, amongst others, a mechanism called collaborative filtering (CF) to predict the rating that a user will give to an item given the ratings of other items provided by other users. While reasonably accurate CF can be achieved with various well-known techniques, preserving the privacy of rating data from individual users poses a significant challenge. Several privacy preserving schemes have, so far, been proposed in prior work. However, while these schemes are theoretically feasible, there are many practical implementation difficulties on real world public cloud computing platforms. In this paper, we present our implementation experience and experimental results on two public Software-as-a-Service (SaaS) enabling Platform-as-a-Service (PaaS) clouds: the Google App Engine for Java (GAE/J) and the Amazon Web Services Elastic Beanstalk (AWS EBS).a

[1]  Hiroaki Kikuchi,et al.  Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[2]  Daniel Lemire,et al.  Slope One Predictors for Online Rating-Based Collaborative Filtering , 2007, SDM.

[3]  Jaideep Vaidya,et al.  Privacy-preserving Collaborative Filtering for the Cloud , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[4]  Waseem Ahmad,et al.  An Architecture for Privacy Preserving Collaborative Filtering on Web Portals , 2007 .

[5]  Philip S. Yu,et al.  Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[6]  Ian Wakeman,et al.  Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership , 2007, MPAC '07.

[7]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[8]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[9]  Syr Hui,et al.  US Patent Application , 2013 .

[10]  Songjie Gong,et al.  Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation , 2011 .

[11]  Tsvi Kuflik,et al.  Enhancing privacy and preserving accuracy of a distributed collaborative filtering , 2007, RecSys '07.

[12]  Hannes Federrath,et al.  International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability , 2001 .

[13]  Wenliang Du,et al.  SVD-based collaborative filtering with privacy , 2005, SAC '05.

[14]  Wenliang Du,et al.  Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data , 2005, PKDD.

[15]  John F. Canny,et al.  Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.

[16]  L. C. Smith Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques , 2013 .

[17]  Jaideep Vaidya,et al.  Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering , 2011 .

[18]  Sotirios Terzis,et al.  Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference , 2007 .

[19]  Eli Biham,et al.  Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques , 2003 .

[20]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[21]  Wenliang Du,et al.  Achieving Private Recommendations Using Randomized Response Techniques , 2006, PAKDD.

[22]  Rosario Gennaro,et al.  Fully non-interactive onion routing with forward secrecy , 2013, International Journal of Information Security.

[23]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[24]  Huseyin Polat,et al.  P2P collaborative filtering with privacy , 2010, Turkish Journal of Electrical Engineering and Computer Sciences.

[25]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[26]  George Danezis Mix-Networks with Restricted Routes , 2003, Privacy Enhancing Technologies.

[27]  Luís Torgo,et al.  Knowledge Discovery in Databases: PKDD 2005, 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, Porto, Portugal, October 3-7, 2005, Proceedings , 2005, PKDD.

[28]  Rosario Gennaro,et al.  Fully non-interactive onion routing with forward secrecy , 2011, International Journal of Information Security.

[29]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[30]  Johanna D. Moore,et al.  Evaluating information presentation strategies for spoken recommendations , 2007, RecSys '07.

[31]  Boonserm Kijsirikul,et al.  Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining , 2003, KDD 2003.

[32]  John Riedl,et al.  Recommender systems in e-commerce , 1999, EC '99.

[33]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[34]  Sahin Albayrak,et al.  An agent-based approach for privacy-preserving recommender systems , 2007, AAMAS '07.

[35]  Gene Tsudik,et al.  Proceedings of the 9th international conference on Applied cryptography and network security , 2011 .