Skip to main content

Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS)

  • Conference paper
  • First Online:
Ubiquitous Security (UbiSec 2021)

Abstract

The current surge in recommender systems research is impressive, but it has highlighted a number of concerns, including users’ privacy and data security. Although various solutions to these privacy breaches have been proposed, the existing solutions fall short of directly addressing the real issues, and most of them continue to rely on third parties. Moreover, giving third parties access to users’ personally identifiable information (PII) is a cause for concern. In this paper, we have suggested a two-tiered architecture. The identity of the users is anonymized in the first tier, in the next tier, homomorphic encryption is exploited for the purpose of randomization of the users’ data. With the help of proposed solution, on one hand, third-party involvement can be eliminated. On the other hand, there can be improvement in the privacy mechanism by providing a two-tier architecture for user data security. The suggested framework is intended to serve as a baseline for safeguarding users’ privacy and integrity when conducting online purchases and other associated activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sohail, S.S., Siddiqui, J., Ali, R.: Feature-based opinion mining approach (FOMA) for improved book recommendation. Arab. J. Sci. Eng. 43(12), 8029–8048 (2018). https://doi.org/10.1007/s13369-018-3282-3

    Article  Google Scholar 

  2. Knijnenburg, B.P., Berkovsky, S.: Privacy for recommender systems: tutorial abstract. In: Proceedings of the Eleventh ACM Conference on Recommender Systems, pp. 394–395, 27 August 2017

    Google Scholar 

  3. Batmaz, Z., Kaleli, C.: Methods of privacy preserving in collaborative filtering. In: 2017 IEEE International Conference on Computer Science and Engineering (UBMK), pp. 261–266, 5 October 2017

    Google Scholar 

  4. Badsha, S., Yi, X., Khalil, I.: A practical privacy-preserving recommender system. Data Sci. Eng. 1(3), 161–177 (2016)

    Article  Google Scholar 

  5. Mohallick, I., Özgöbek, Ö.: Exploring privacy concerns in news recommender systems. In: Proceedings of the International Conference on Web Intelligence, pp. 1054–1061, 23 August 2017

    Google Scholar 

  6. Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 7–12, 17 August 2009

    Google Scholar 

  7. Lu, J., Wu, D., Mao, M., Wang, W., Zhang, G.: Recommender system application developments: a survey. Decis. Support Syst. 1(74), 12–32 (2015)

    Article  Google Scholar 

  8. Jeckmans, A.J.P., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R.L., Tang, Q.: Privacy in recommender systems. In: Ramzan, N., van Zwol, R., Lee, J.S., Clüver, K., Hua, X.S. (eds.) Social Media Retrieval. CCN. Springer, London (2013). https://doi.org/10.1007/978-1-4471-4555-4_12

  9. Friedman, A., Knijnenburg, B.P., Vanhecke, K., Martens, L., Berkovsky, S.: Privacy aspects of recommender systems. In: Ricci, F., Rokach, L., Shapira, B. (eds.) Recommender Systems Handbook. Springer, Boston (2015). https://doi.org/10.1007/978-1-4899-7637-6_19

  10. Jeckmans, A.J.: Cryptographically-Enhanced Privacy for Recommender Systems. University of Twente, 15 February 2014

    Google Scholar 

  11. Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 59–69. Society for Industrial and Applied Mathematics, 20 April 2006

    Google Scholar 

  12. Rajendran, K., Jayabalan, M., Rana, M.E.: A study on k-anonymity, l-diversity, and t-closeness techniques. IJCSNS 17(12), 172 (2017)

    Google Scholar 

  13. Canny, J.: Collaborative filtering with privacy. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE, 12 May 2002

    Google Scholar 

  14. Hoens, T.R., Blanton, M., Chawla, N.V.: A private and reliable recommendation system for social networks. In: 2010 IEEE Second International Conference on Social Computing, pp. 816–825. IEEE, 20 August 2010

    Google Scholar 

  15. Erkin, Z., Beye, M., Veugen, T., Lagendijk, R.L.: Privacy enhanced recommender system. In: Thirty-First Symposium on Information Theory in the Benelux, pp. 35–42, 11 May 2010

    Google Scholar 

  16. Sun, X., Pan, Z., Bertino, E. (eds.): Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, 8–10 June 2018, Revised Selected Papers, Part III. Springer, Cham, 8 December 2021. https://doi.org/10.1007/978-3-030-00012-7

  17. Shakil, U.S., et al.: The impact of randomized algorithm over recommender system. Procedia Comput. Sci. 194, 218–223 (2021)

    Article  Google Scholar 

  18. Sohail, S.S., Siddiqui, J., Ali, R.: An OWA-based ranking approach for university books recommendation. Int. J. Intell. Syst. 33(2), 396–416 (2018)

    Article  Google Scholar 

  19. Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in VANETs: communication, applications and challenges. Veh. Commun. 19, 100179 (2019)

    Google Scholar 

  20. Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235–246 (2018)

    Article  Google Scholar 

  21. Arif, M., Wang, G., Wang, T., Peng, T.: SDN-based secure VANETs communication with fog computing. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 46–59. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_4

    Chapter  Google Scholar 

  22. Shakil, U.S., Alam, M.T., Sohail, S.S.: Rising cyber crime in rural India: a review. Int. J. Adv. Res. Sci. Commun. Technol. [Internet] 6(1), 199–205 (2021). https://doi.org/10.48175/ijarsct-1372

  23. Alam, M.T., Ubaid, S., Sohail, S.S., Alam, M.A.: A Neutrosophic cognitive map based approach to explore the health deterioration factors. Neutrosophic Sets Syst. 1, 41 (2021)

    Google Scholar 

  24. Alam, M.T., Ubaid, S., Sohail, S.S., Nadeem, M., Hussain, S., Siddiqui, J.: Comparative analysis of machine learning based filtering techniques using MovieLens dataset. Procedia Comput Sci. 1(194), 210–217 (2021)

    Article  Google Scholar 

  25. Arif, M., et al.: SDN-based VANETs, security attacks, applications, and challenges. Appl. Sci. 10(9), 3217 (2020)

    Article  Google Scholar 

  26. Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 681–688. IEEE (2018)

    Google Scholar 

  27. Liu, X., Wang, G., Bhuiyan, M.Z.A.: Personalised context-aware re-ranking in recommender system. Connection Sci. 1–20 (2021). https://doi.org/10.1080/09540091.2021.1997915

  28. Liu, X., Wang, G., Bhuiyan, M.Z.A.: Re-ranking with multiple objective optimization in recommender system. Trans. Emerg. Telecommun. Technol. 33(1), e4398 (2022). https://doi.org/10.1002/ett.4398

    Article  Google Scholar 

  29. Arif, M., Wang, G., Balas, V.E., Geman, O., Castiglione, A., Chen, J.: SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26, 100265 (2020)

    Google Scholar 

  30. Arif, M., Wang, G., Peng, T., Balas, V.E., Geman, O., Chen, J.: Optimization of communication in VANETs using fuzzy logic and artificial Bee colony. J. Intell. Fuzzy Syst. 38(5), 6145–6157 (2020)

    Article  Google Scholar 

  31. Arif, M., Wang, G.: Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Networks Distrib. Syst. 24(2), 143–166 (2020)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Key Research and Development Program of China under Grant No. 2020YFB1005804, the Key Project of the National Natural Science Foundation of China under Grant No. 61632009, and the Key Project Initiative of the Guangdong Provincial Natural Science Foundation under Grant No. 2017A030308006.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shakil et al. (2022). Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0468-4_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0467-7

  • Online ISBN: 978-981-19-0468-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics