2018
DOI: 10.1109/tdsc.2016.2631533
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Friendship-Based Recommender Systems

Abstract: Privacy-preserving recommender systems have been an active research topic for many years. However, until today, it is still a challenge to design an efficient solution without involving a fully trusted third party or multiple semitrusted third parties. The key obstacle is the large underlying user populations (i.e. huge input size) in the systems. In this paper, we revisit the concept of friendship-based recommender systems, proposed by Jeckmans et al. and Tang and Wang. These solutions are very promising beca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 30 publications
0
13
0
Order By: Relevance
“…Following this strategy, no third parties or external entities need to be trusted by the users to preserve their privacy. Existing approaches use different techniques and mechanisms and could be categorized mainly into three categories: cryptographic-based techniques [6,21,40,74,172], differential privacy-based approaches [66,76,89,120,128,130,166,197,198], and perturbation-based techniques [75,118,146,147,148,151,153,158,183] A group of works focus on providing cryptographic solutions to the problem of secure recommender systems. The approaches do not let the single trusted party have access to everyone's data [6,21,40,74,172].…”
Section: Recommendation Systems and Privacymentioning
confidence: 99%
“…Following this strategy, no third parties or external entities need to be trusted by the users to preserve their privacy. Existing approaches use different techniques and mechanisms and could be categorized mainly into three categories: cryptographic-based techniques [6,21,40,74,172], differential privacy-based approaches [66,76,89,120,128,130,166,197,198], and perturbation-based techniques [75,118,146,147,148,151,153,158,183] A group of works focus on providing cryptographic solutions to the problem of secure recommender systems. The approaches do not let the single trusted party have access to everyone's data [6,21,40,74,172].…”
Section: Recommendation Systems and Privacymentioning
confidence: 99%
“…This is arguably a harder to acquire information compared to the item profile, however, we do not consider this as a significant impediment to our attack. Namely, due to the wide spread of social networks and its increasing role in recommendation systems [35,56,60,61], it has become common for users to share their personal (non-sensitive) recommendations through social networks: for example most websites running recommender systems provide the users the option to embed the information to blogs or to share it via Twitter and Facebooks. We can also consider alternative indirect approaches.…”
Section: Threat Modelmentioning
confidence: 99%
“…Here, behavior is the purchase or rating histories of users in a recommender system, and can be further divided into public and private behavior. Public behavior is shared through social networks such as blogs and Facebook [35,56,60,61], or through item similarity lists, e.g., Amazon's "Customers who bought this item also bought..." feature [8]. Private behavior is those wished to be kept private such as purchase history of sensitive items; e.g., medical items, sexual movies.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recommender system has been applied to many application areas like Music [4], Friend [5], Trip [6], Movie [7][8] [9], News [10], Social-Media recommendation [11], and many more. Recommending similar movies to the active user as per the likeness is called Movie Recommender System (MRS).…”
Section: Thisinformationmentioning
confidence: 99%