2016 IEEE 9th International Conference on Cloud Computing (CLOUD) 2016
DOI: 10.1109/cloud.2016.0141
|View full text |Cite
|
Sign up to set email alerts
|

Protect Both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations

Abstract: Abstract-In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers. In order to protect service quality, the integrity of computation results needs to be guaranteed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…The challenge is how to design those fake tuples for authentication while keeping the original data analytics results unchanged. The existing authentication solutions include various types of data mining computations, including association rule mining [27], [28], [29], outlier mining [30], [48], clustering [46], Bayesian network construction [47], and collaborative filtering [70], [72]. Many of these solutions (e.g.…”
Section: Authentication Of Various Types Of Outsourced Computationsmentioning
confidence: 99%
“…The challenge is how to design those fake tuples for authentication while keeping the original data analytics results unchanged. The existing authentication solutions include various types of data mining computations, including association rule mining [27], [28], [29], outlier mining [30], [48], clustering [46], Bayesian network construction [47], and collaborative filtering [70], [72]. Many of these solutions (e.g.…”
Section: Authentication Of Various Types Of Outsourced Computationsmentioning
confidence: 99%