2018
DOI: 10.1007/978-3-030-00012-7_63
|View full text |Cite
|
Sign up to set email alerts
|

Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…Using this concept, the general form of the string is “privacy” AND “security” AND “mobile” AND “(app OR application)” AND “(recommendation OR recommender)”. In the same manner, we wanted to classify studies according to data obfuscation and cryptographic techniques (Ogunseyi and Yang, 2018). So, instead of creating a research question, we have adopted the systematic mapping approach as discussed in Enríquez et al (2019).…”
Section: Slr Process and Resultsmentioning
confidence: 99%
“…Using this concept, the general form of the string is “privacy” AND “security” AND “mobile” AND “(app OR application)” AND “(recommendation OR recommender)”. In the same manner, we wanted to classify studies according to data obfuscation and cryptographic techniques (Ogunseyi and Yang, 2018). So, instead of creating a research question, we have adopted the systematic mapping approach as discussed in Enríquez et al (2019).…”
Section: Slr Process and Resultsmentioning
confidence: 99%
“…Secret sharing as a cryptographic tool can be applied in a situation where access to sensitive information has to be protected by more than one party. It is a scheme in which different shares of a secret are distributed to parties such that only a fixed subset of parties can reconstruct the secret [60]. Secret sharing may be used to preserve privacy in digital forensics by distributing a secret (suspect's data) into n pieces/data files and storing them in different locations to prevent leaking.…”
Section: Secret Sharingmentioning
confidence: 99%
“…Recent years, Recommender System helps to solve the problem of information overload while providing personalized information retrieval [14]. However, in order to improve the recommendation efficiency, the system requires the personal information of users, which is a serious privacy concern for many users [15,16]. Recent research indicates that there are two methods to solve the privacy problem of the Recommender system: Architecture-based and Algorithms-based [17].…”
Section: Related Workmentioning
confidence: 99%
“…end (10) forAgen k ∈ AC i do (11) calculate W aggr,k ′ following equation ( 13); ( 12) end (13) calculate W rec ′ � W fe d ′ following equation ( 14); ( 14) end (15) our scheme takes the least time no matter how many Items. is is because the encryption form in PRO-NBR can only deal with a bit message per encryption, and EPRT can deal with an integer message, whereas our scheme can deal with p integer messages.…”
Section: Efficiency Comparisonmentioning
confidence: 99%