
Toward Privacy-Preserving Personalized Recommendation Services
Cong Wang, Yifeng Zheng, Jinghua Jiang, Kui Ren
Engineering ›› 2018, Vol. 4 ›› Issue (1) : 21-28.
Toward Privacy-Preserving Personalized Recommendation Services
Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions.
Privacy protection / Personalized recommendation services / Targeted delivery / Collaborative filtering / Machine learning
[1] |
I. Mackenzie, C. Meyer, S. Noble. How retailers can keep up with consumers [Internet]. McKinsey & Company, Chicago (1996-2018) [cited 2017 Mar 22]. Available from: http://www.mckinsey.com/industries/retail/our-insights/how-retailers-can-keep-up-with-consumers
|
[2] |
J. Hassler. The power of personalized product recommendations [Internet]. Intelliverse, Carrollton (2018) [updated 2017 Aug 22; cited 2017 Mar 22]. Available from: http://www.intelliverse.com/blog/the-power-of-personalized-product-recommendations/
|
[3] |
|
[4] |
|
[5] |
|
[6] |
|
[7] |
K. Xu, Z. Yan. Privacy protection in mobile recommender systems: A survey. G. Wang, I. Ray, J. Alcaraz Calero, S. Thampi (Eds.), Proceedings of the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage; 2016 Nov 16-18; Zhangjiajie, China, Springer, Cham (2016), pp. 305-318. DOI: 10.1007/978-3-319-49148-6_26
|
[8] |
|
[9] |
|
[10] |
|
[11] |
|
[12] |
H. Polat, W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. Proceedings of the 3rd IEEE International Conference on Data Mining; 2003 Nov 19-22; Melbourne, FL, USA, IEEE Computer Society Press, Los Alamitos (2003), pp. 625-628
|
[13] |
R. Shokri, P. Pedarsani, G. Theodorakopoulos, J.P. Hubaux. Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. Proceedings of the 3rd ACM Conference on Recommender Systems; 2009 Oct 23-25; New York, NY, USA, Association for Computing Machinery, Inc., New York (2009), pp. 157-164. DOI: DOI: 10.1145/1639714.1639741
|
[14] |
|
[15] |
Z. Huang, W. Du, B. Chen. Deriving private information from randomized data. Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data; 2005 Jun 14-16; Baltimore, MD, USA, Association for Computing Machinery, Inc., New York (2005), pp. 37-48. DOI: 10.1145/1066157.1066163
|
[16] |
S. Zhang, J. Ford, F. Makedon. Deriving private information from randomly perturbed ratings. J. Ghosh, D. Lambert, D. Skillicorn, J. Srivastava (Eds.), Proceedings of the 2006 SIAM International Conference on Data Mining; 2006 Apr 20-22; Bethesda, MD, USA, Society for Industrial and Applied Mathematics, Philadelphia (2006), pp. 59-69. DOI: 10.1137/1.9781611972764.6
|
[17] |
C.C. Aggarwal. On randomization, public information and the curse of dimensionality. Proceedings of the 23rd International Conference on Data Engineering; 2007 Apr 15-20; Istanbul, Turkey, IEEE Computer Society Press, Los Alamitos (2007), pp. 136-145
|
[18] |
|
[19] |
S. Kim, J. Kim, D. Koo, Y. Kim, H. Yoon, J. Shin. Efficient privacy-preserving matrix factorization via fully homomorphic encryption: Extended abstract. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security; 2016 May 30-Jun 3; Xi'an, China, Association for Computing Machinery, Inc., New York (2016), pp. 617-628
|
[20] |
V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, N. Taft. Privacy-preserving ridge regression on hundreds of millions of records. Proceeding of the 2013 IEEE Symposium on Security and Privacy; 2013 May 19-22; Berkeley, CA, USA, IEEE Computer Society Press, Los Alamitos (2013), pp. 334-348
|
[21] |
S. Hu, Q. Wang, J. Wang, S.S.M. Chow, Q. Zou. Securing fast learning! Ridge regression over encrypted big data. Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA; 2016 Aug 23-26; Tianjin, China, IEEE Computer Society Press, Los Alamitos (2016), pp. 19-26
|
[22] |
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, S. Barocas. Adnostic: Privacy preserving targeted advertising. Proceedings of the 2010 Network and Distributed System Security Symposium; 2010 Feb 28-Mar 3; San Diego, CA, USA, Internet Society, Reston (2010), pp. 1-16. DOI: 10.1109/CCNC.2010.5421609
|
[23] |
|
[24] |
S. Guha, B. Cheng, P. Francis. Privad: Practical privacy in online advertising. Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation; 2011 Mar 30-Apr 1; Boston, MA, USA, USENIX Association, Berkeley (2011), pp. 169-182
|
[25] |
M. Backes, A. Kate, M. Maffei, K. Pecina. ObliviAd: Provably secure and practical online behavioral advertising. Proceedings of the 2012 IEEE Symposium on Security and Privacy; 2012 May 20-23; San Francisco, CA, USA, IEEE Computer Society Press, Los Alamitos (2012), pp. 257-271
|
[26] |
|
[27] |
J. Jiang, X. Gui, Z. Shi, X. Yuan, C. Wang. Towards secure and practical targeted mobile advertising. Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks; 2015 Dec 16-18; Shenzhen, China, IEEE Computer Society Press, Los Alamitos (2015), pp. 79-88. DOI: 10.1109/MSN.2015.17
|
[28] |
M. Hardt, S. Nath. Privacy-aware personalization for mobile advertising. Proceedings of the 2012 ACM Conference on Computer and Communications Security; 2012 Oct 16-18; Raleigh, NC, USA, Association for Computing Machinery, Inc., New York (2012), pp. 662-673. DOI: 10.1145/2382196.2382266
|
[29] |
D. Davidson, M. Fredrikson, B. Livshits. MoRePriv: Mobile OS support for application personalization and privacy. Proceedings of the 30th Annual Computer Security Applications Conference; 2014 Dec 8-12; New Orleans, LA, USA, Association for Computing Machinery, Inc., New York (2014), pp. 236-245. DOI: 10.1145/2664243.2664266
|
[30] |
Partridge K, Pathak MA, Uzun E, Wang C. PiCoDa: Privacy-preserving smart coupon delivery architecture. In: Proceedings of 5th Workshop on Hot Topics in Privacy Enhancing Technologies; 2012 Jul 11-13; Vigo, Spain; 2012. p. 95-108.
|
[31] |
S. Rane, E. Uzun. A fuzzy commitment approach to privacy preserving behavioral targeting. Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments; 2014 Sep 11; Maui, HI, USA, Association for Computing Machinery, Inc., New York (2014), pp. 31-36. DOI: 10.1145/2646584.2646591
|
[32] |
|
[33] |
D. Wu, R.K.C. Chang. Analyzing Android browser apps for file:// vulnerabilities. S.S.M. Chow, J. Camenisch, L.C.K. Hui, S.M. Yiu (Eds.), Proceedings of the 17th International Conference on Information Security; 2014 Oct 12-14; Hong Kong, China, Springer, Cham (2014), pp. 345-363. DOI: 10.1007/978-3-319-13257-0_20
|
[34] |
S. Son, D. Kim, V. Shmatikov. What mobile ads know about mobile users. Proceedings of 2016 Network and Distributed System Security Symposium; 2016 Feb 21-24; San Diego, CA, USA, Internet Society, Reston (2016), pp. 1-14
|
[35] |
|
[36] |
F. Li, Y. He, B. Niu, H. Li, H. Wang. Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation. Proceedings of the 2016 International Conference on Computing, Networking and Communications; 2016 Feb 15-18; Kauai, HI, USA, Institute of Electrical and Electronic Engineers, Inc., Piscataway (2016), pp. 1-6
|
/
〈 |
|
〉 |