Abstract
The current surge in recommender systems research is impressive, but it has highlighted a number of concerns, including users’ privacy and data security. Although various solutions to these privacy breaches have been proposed, the existing solutions fall short of directly addressing the real issues, and most of them continue to rely on third parties. Moreover, giving third parties access to users’ personally identifiable information (PII) is a cause for concern. In this paper, we have suggested a two-tiered architecture. The identity of the users is anonymized in the first tier, in the next tier, homomorphic encryption is exploited for the purpose of randomization of the users’ data. With the help of proposed solution, on one hand, third-party involvement can be eliminated. On the other hand, there can be improvement in the privacy mechanism by providing a two-tier architecture for user data security. The suggested framework is intended to serve as a baseline for safeguarding users’ privacy and integrity when conducting online purchases and other associated activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sohail, S.S., Siddiqui, J., Ali, R.: Feature-based opinion mining approach (FOMA) for improved book recommendation. Arab. J. Sci. Eng. 43(12), 8029–8048 (2018). https://doi.org/10.1007/s13369-018-3282-3
Knijnenburg, B.P., Berkovsky, S.: Privacy for recommender systems: tutorial abstract. In: Proceedings of the Eleventh ACM Conference on Recommender Systems, pp. 394–395, 27 August 2017
Batmaz, Z., Kaleli, C.: Methods of privacy preserving in collaborative filtering. In: 2017 IEEE International Conference on Computer Science and Engineering (UBMK), pp. 261–266, 5 October 2017
Badsha, S., Yi, X., Khalil, I.: A practical privacy-preserving recommender system. Data Sci. Eng. 1(3), 161–177 (2016)
Mohallick, I., Özgöbek, Ö.: Exploring privacy concerns in news recommender systems. In: Proceedings of the International Conference on Web Intelligence, pp. 1054–1061, 23 August 2017
Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 7–12, 17 August 2009
Lu, J., Wu, D., Mao, M., Wang, W., Zhang, G.: Recommender system application developments: a survey. Decis. Support Syst. 1(74), 12–32 (2015)
Jeckmans, A.J.P., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R.L., Tang, Q.: Privacy in recommender systems. In: Ramzan, N., van Zwol, R., Lee, J.S., Clüver, K., Hua, X.S. (eds.) Social Media Retrieval. CCN. Springer, London (2013). https://doi.org/10.1007/978-1-4471-4555-4_12
Friedman, A., Knijnenburg, B.P., Vanhecke, K., Martens, L., Berkovsky, S.: Privacy aspects of recommender systems. In: Ricci, F., Rokach, L., Shapira, B. (eds.) Recommender Systems Handbook. Springer, Boston (2015). https://doi.org/10.1007/978-1-4899-7637-6_19
Jeckmans, A.J.: Cryptographically-Enhanced Privacy for Recommender Systems. University of Twente, 15 February 2014
Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 59–69. Society for Industrial and Applied Mathematics, 20 April 2006
Rajendran, K., Jayabalan, M., Rana, M.E.: A study on k-anonymity, l-diversity, and t-closeness techniques. IJCSNS 17(12), 172 (2017)
Canny, J.: Collaborative filtering with privacy. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE, 12 May 2002
Hoens, T.R., Blanton, M., Chawla, N.V.: A private and reliable recommendation system for social networks. In: 2010 IEEE Second International Conference on Social Computing, pp. 816–825. IEEE, 20 August 2010
Erkin, Z., Beye, M., Veugen, T., Lagendijk, R.L.: Privacy enhanced recommender system. In: Thirty-First Symposium on Information Theory in the Benelux, pp. 35–42, 11 May 2010
Sun, X., Pan, Z., Bertino, E. (eds.): Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, 8–10 June 2018, Revised Selected Papers, Part III. Springer, Cham, 8 December 2021. https://doi.org/10.1007/978-3-030-00012-7
Shakil, U.S., et al.: The impact of randomized algorithm over recommender system. Procedia Comput. Sci. 194, 218–223 (2021)
Sohail, S.S., Siddiqui, J., Ali, R.: An OWA-based ranking approach for university books recommendation. Int. J. Intell. Syst. 33(2), 396–416 (2018)
Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in VANETs: communication, applications and challenges. Veh. Commun. 19, 100179 (2019)
Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235–246 (2018)
Arif, M., Wang, G., Wang, T., Peng, T.: SDN-based secure VANETs communication with fog computing. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 46–59. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_4
Shakil, U.S., Alam, M.T., Sohail, S.S.: Rising cyber crime in rural India: a review. Int. J. Adv. Res. Sci. Commun. Technol. [Internet] 6(1), 199–205 (2021). https://doi.org/10.48175/ijarsct-1372
Alam, M.T., Ubaid, S., Sohail, S.S., Alam, M.A.: A Neutrosophic cognitive map based approach to explore the health deterioration factors. Neutrosophic Sets Syst. 1, 41 (2021)
Alam, M.T., Ubaid, S., Sohail, S.S., Nadeem, M., Hussain, S., Siddiqui, J.: Comparative analysis of machine learning based filtering techniques using MovieLens dataset. Procedia Comput Sci. 1(194), 210–217 (2021)
Arif, M., et al.: SDN-based VANETs, security attacks, applications, and challenges. Appl. Sci. 10(9), 3217 (2020)
Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 681–688. IEEE (2018)
Liu, X., Wang, G., Bhuiyan, M.Z.A.: Personalised context-aware re-ranking in recommender system. Connection Sci. 1–20 (2021). https://doi.org/10.1080/09540091.2021.1997915
Liu, X., Wang, G., Bhuiyan, M.Z.A.: Re-ranking with multiple objective optimization in recommender system. Trans. Emerg. Telecommun. Technol. 33(1), e4398 (2022). https://doi.org/10.1002/ett.4398
Arif, M., Wang, G., Balas, V.E., Geman, O., Castiglione, A., Chen, J.: SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26, 100265 (2020)
Arif, M., Wang, G., Peng, T., Balas, V.E., Geman, O., Chen, J.: Optimization of communication in VANETs using fuzzy logic and artificial Bee colony. J. Intell. Fuzzy Syst. 38(5), 6145–6157 (2020)
Arif, M., Wang, G.: Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Networks Distrib. Syst. 24(2), 143–166 (2020)
Acknowledgment
This work is supported by the National Key Research and Development Program of China under Grant No. 2020YFB1005804, the Key Project of the National Natural Science Foundation of China under Grant No. 61632009, and the Key Project Initiative of the Guangdong Provincial Natural Science Foundation under Grant No. 2017A030308006.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shakil et al. (2022). Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_20
Download citation
DOI: https://doi.org/10.1007/978-981-19-0468-4_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0467-7
Online ISBN: 978-981-19-0468-4
eBook Packages: Computer ScienceComputer Science (R0)