2016
DOI: 10.1007/s11432-015-0981-4
|View full text |Cite
|
Sign up to set email alerts
|

APPLET: a privacy-preserving framework for location-aware recommender system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…As to the Adult Dataset, for each computing nodes, we generate 300K objects based on its 34K data. The number of object attributes is in the range of [2,5]; meanwhile, the values of the object attributes are in the range of [0, 10 4 ]. We divide the data into N * cells of the same size, where N * is an integral multiple of N. Each cell and the corresponding data are randomly transmitted to the computing nodes.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…As to the Adult Dataset, for each computing nodes, we generate 300K objects based on its 34K data. The number of object attributes is in the range of [2,5]; meanwhile, the values of the object attributes are in the range of [0, 10 4 ]. We divide the data into N * cells of the same size, where N * is an integral multiple of N. Each cell and the corresponding data are randomly transmitted to the computing nodes.…”
Section: Performance Analysismentioning
confidence: 99%
“…As a successful case deployed on the EC 2 , the Nimbus Health , manages and distributes patient medical records by the cloud service; in addition, the ShareThis , treated as a content‐sharing social network, has shared 430 million items across 30 000 websites. Since data in cloud servers is shared to all query users, if without any privacy‐preserving procedures, sensitive information of data publishers may be revealed to malicious users 2 . If the privacy information of cloud users cannot be protected necessarily, the future development of public cloud will be extremely worrying.…”
Section: Introductionmentioning
confidence: 99%
“…To enable recommender systems to carry out computation over ciphertext directly, the encryption algorithms to be used have to be homomorphic, that is, the result of operations performed on ciphertext, when decrypted, matches the result of operations performed on the corresponding plaintext. For example, Paillier cryptosystem [14] was employed by Erkin et al [6] and Ma et al [10], ElGamal cryptosystem [5] was used by Zhan et al [17] and Badsha et al [1], to realize privacy-preserving recommender systems. However, homomorphic encryption is built on expensive public-key cryptography, which is theoretical in nature and cannot be applied in practice due to the prohibitive computation cost.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, location trajectories can excavate more sensitive information despite location. In this regard, location privacy-preserving mechanisms have been extensively studied, such as Dummy, spatial confusion [3,4], encryption technology [5,6], differential privacy (DP) [7,8] and references therein.…”
mentioning
confidence: 99%