Skip to main content

On Differentially Private Online Collaborative Recommendation Systems

  • Conference paper
  • First Online:
Information Security and Cryptology - ICISC 2015 (ICISC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9558))

Included in the following conference series:

  • 883 Accesses

Abstract

In collaborative recommendation systems, privacy may be compromised, as users’ opinions are used to generate recommendations for others. In this paper, we consider an online collaborative recommendation system, and we measure users’ privacy in terms of the standard notion of differential privacy. We give the first quantitative analysis of the trade-offs between recommendation quality and users’ privacy in such a system by showing a lower bound on the best achievable privacy for any algorithm with non-trivial recommendation quality, and proposing a near-optimal algorithm. From our results, we find that there is actually little trade-off between recommendation quality and privacy, as long as non-trivial recommendation quality is to be guaranteed. Our results also identify the key parameters that determine the best achievable privacy.

A full version [21] of this paper is available at http://arxiv.org/abs/1510.08546. This research was supported by MOE ARC-2 grant MOE2014-T2-1-157.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Technically, the assumptions that \(n = O(\mathrm {polylog}(T))\), \(P \ge 6m\) and \(R = O(T^\nu )\) are only for showing the near-optimality of our lower bound. Our lower bound itself remains to hold without these assumptions.

  2. 2.

    On the other hand, our privacy definition does not imply their definitions either. Therefore these two types of privacy models are incomparable.

  3. 3.

    This statement actually holds for all the algorithms with o(T) loss. In Theorem 1, we choose \(O(T^\eta )\) target loss to get a clean expression for the lower bound on \(\epsilon \), and a similar (but messier) lower bound on \(\epsilon \) holds for o(T) target loss too.

References

  1. Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734–749 (2005)

    Article  Google Scholar 

  2. Awerbuch, B., Hayes, T.P.: Online collaborative filtering with nearly optimal dynamic regret. In: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, pp. 315–319. ACM (2007)

    Google Scholar 

  3. Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of the 2007 ACM Conference on Recommender Systems. pp. 9–16. ACM (2007)

    Google Scholar 

  4. Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 609–618. ACM (2008)

    Google Scholar 

  5. Bolot, J., Fawaz, N., Muthukrishnan, S., Nikolov, A., Taft, N.: Private decayed predicate sums on streams. In: Proceedings of the 16th International Conference on Database Theory, pp. 284–295. ACM (2013)

    Google Scholar 

  6. Calandrino, J., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V., et al.: “You might also like:” privacy risks of collaborative filtering. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 231–246. IEEE (2011)

    Google Scholar 

  7. Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE (2002)

    Google Scholar 

  8. Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 238–245. ACM (2002)

    Google Scholar 

  9. Cesa-Bianchi, N., Lugosi, G.: Prediction, Learning, and Games. Cambridge University Press, New York (2006)

    Book  MATH  Google Scholar 

  10. Chan, T.-H.H., Li, M., Shi, E., Xu, W.: Differentially private continual monitoring of heavy hitters from distributed streams. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 140–159. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Chan, T.H.H., Shi, E., Song, D.: Private and continual release of statistics. ACM Trans. Inf. Syst. Secur. 14(3), 26 (2011)

    Article  MATH  Google Scholar 

  12. Chaudhuri, K., Sarwate, A.D., Sinha, K.: A near-optimal algorithm for differentially-private principal components. J. Mach. Learn. Res. 14(1), 2905–2943 (2013)

    MathSciNet  MATH  Google Scholar 

  13. Chow, R., Pathak, M.A., Wang, C.: A practical system for privacy-preserving collaborative filtering. In: Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), pp. 547–554. IEEE (2012)

    Google Scholar 

  14. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Dwork, C.: The differential privacy frontier (extended abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 496–502. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)

    Article  Google Scholar 

  17. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 715–724. ACM (2010)

    Google Scholar 

  19. Dwork, C., Naor, M., Reingold, O., Rothblum, G.N., Vadhan, S.: On the complexity of differentially private data release: efficient algorithms and hardness results. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 381–390. ACM (2009)

    Google Scholar 

  20. Dwork, C., Smith, A.: Differential privacy for statistics: what we know and what we want to learn. J. Priv. confidentiality 1(2), 2 (2010)

    Google Scholar 

  21. Gilbert, S., Liu, X., Yu, H.: On differentially private online collaborative recommendation systems. ArXiv e-prints (2015). arxiv:1510.08546

  22. Guerraoui, R., Kermarrec, A.M., Patra, R., Taziki, M.: D2P: distance-based differential privacy in recommenders. Proc. VLDB Endowment 8(8), 862–873 (2015)

    Article  Google Scholar 

  23. Hardt, M., Roth, A.: Beating randomized response on incoherent matrices. In: Proceedings of the 44th annual ACM Symposium on Theory of Computing, pp. 1255–1268. ACM (2012)

    Google Scholar 

  24. Hardt, M., Roth, A.: Beyond worst-case analysis in private singular vector computation. In: Proceedings of the 45th annual ACM Symposium on Theory of Computing, pp. 331–340. ACM (2013)

    Google Scholar 

  25. Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, pp. 61–70. IEEE (2010)

    Google Scholar 

  26. Jain, P., Kothari, P., Thakurta, A.: Differentially private online learning. In: Proceedings of the 25th Annual Conference on Learning Theory, pp. 24.1–24.34 (2011)

    Google Scholar 

  27. Kalai, A., Vempala, S.: Efficient algorithms for online decision problems. J. Comput. Syst. Sci. 71(3), 291–307 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  28. Kapralov, M., Talwar, K.: On differentially private low rank approximation. In: Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1395–1414. SIAM (2013)

    Google Scholar 

  29. Kellaris, G., Papadopoulos, S., Xiao, X., Papadias, D.: Differentially private event sequences over infinite streams. Proc. VLDB Endowment 7(12), 1155–1166 (2014)

    Article  Google Scholar 

  30. Kullback, S.: Information Theory and Statistics. Courier Corporation, New York (1968)

    MATH  Google Scholar 

  31. Lee, W.S.: Collaborative learning for recommender systems. In: Proceedings of the 18th International Conference on Machine Learning, pp. 314–321 (2001)

    Google Scholar 

  32. McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627–636. ACM (2009)

    Google Scholar 

  33. Nakamura, A., Abe, N.: Collaborative filtering using weighted majority prediction algorithms. In: Proceedings of the 15th International Conference on Machine Learning, pp. 395–403 (1998)

    Google Scholar 

  34. Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 111–125. IEEE (2008)

    Google Scholar 

  35. Polat, H., Du, W.: Privacy-preserving collaborative filtering. Int. J. Electron. Commer. 9(4), 9–35 (2003)

    Google Scholar 

  36. Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791–795. ACM (2005)

    Google Scholar 

  37. Resnick, P., Sami, R.: The influence limiter: provably manipulation-resistant recommender systems. In: Proceedings of the 2007 ACM Conference on Recommender Systems, pp. 25–32. ACM (2007)

    Google Scholar 

  38. Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 765–774. ACM (2010)

    Google Scholar 

  39. Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.P.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: Proceedings of the 2009 ACM Conference on Recommender Systems, pp. 157–164. ACM (2009)

    Google Scholar 

  40. Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. 2009, Article ID 421425, 19 (2009). Doi: 10.1155/2009/421425

    Google Scholar 

  41. Thakurta, A.G., Smith, A.: (Nearly) optimal algorithms for private online learning in full-information and bandit settings. In: Advances in Neural Information Processing Systems, pp. 2733–2741 (2013)

    Google Scholar 

  42. Xin, Y., Jaakkola, T.: Controlling privacy in recommender systems. In: Advances in Neural Information Processing Systems, pp. 2618–2626 (2014)

    Google Scholar 

  43. Yu, H., Shi, C., Kaminsky, M., Gibbons, P.B., Xiao, F.: Dsybil: optimal sybil-resistance for recommendation systems. In: Proceedings of the 2009 IEEE Symposium on Security and Privacy, pp. 283–298. IEEE (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Gilbert, S., Liu, X., Yu, H. (2016). On Differentially Private Online Collaborative Recommendation Systems. In: Kwon, S., Yun, A. (eds) Information Security and Cryptology - ICISC 2015. ICISC 2015. Lecture Notes in Computer Science(), vol 9558. Springer, Cham. https://doi.org/10.1007/978-3-319-30840-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30840-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30839-5

  • Online ISBN: 978-3-319-30840-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics