Skip to main content
Log in

A systematic review of privacy techniques in recommendation systems

  • Survey
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The problem of information overload and the necessity for precise information retrieval has led to the extensive use of recommendation systems (RS). However, ensuring the privacy of user information during the recommendation is a major concern. Despite efforts to develop privacy-preserving techniques, a research gap remains in identifying effective and efficient techniques that guarantee privacy. To address this gap, this study presents a systematic review of privacy techniques for recommendation systems published in the past 6 years in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The review categorizes and discusses the most promising privacy techniques and leading research domains in the field of privacy-preserving recommendation systems. Moreover, the study highlights the current challenges faced in this field and identifies open research issues that require further investigation. By presenting a comprehensive analysis of existing work, this study aims to provide a valuable resource for researchers working in the area of privacy-preserving recommendation systems and to promote further research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 1–53 (2010)

    Article  Google Scholar 

  2. Aaronson, S.A., Leblond, P.: Another digital divide: the rise of data realms and its implications for the WTO. J. Int. Econ. Law 21(2), 245–272 (2018)

    Article  Google Scholar 

  3. Wu, Z., Li, G., Liu, Q., Xu, G., Chen, E.: Covering the sensitive subjects to protect personal privacy in personalized recommendation. IEEE Trans. Serv. Comput. 11(3), 493–506 (2016)

    Article  Google Scholar 

  4. Ogunseyi T. B, Yang C.: Survey and analysis of cryptographic techniques for Recommendation systems. In: Sun X., Pan Z., Bertino E. (eds) Cloud Computing and Security. Lecture Notes in Computer Science, 11065: 691–706. (2018)

  5. Ozturk, A., Polat, H.: From existing trends to future trends in privacy-preserving collaborative filtering. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 5, 276–291 (2015)

    Article  Google Scholar 

  6. Bilge, A., Kaleli, C., Yakut, I., Gunes, I., Polat, H.: A survey of privacy-preserving collaborative filtering schemes. Int J Soft Eng Knowl Eng 23, 1085–1108 (2013)

    Article  Google Scholar 

  7. Miller, B.N., Konstan, J.A., Riedl, J.P.: (2004) Toward a personal recommendation system. ACM Trans. Inf. Syst. 22, 437–476 (2004)

    Article  Google Scholar 

  8. Jeckmans, A.J.P., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R.L., Tang, Q.: Privacy in Recommendation systems. In: Ramzan, N., et al. (eds.) Computer Communications and Networks, pp. 263–281. Springer-Verlag, London (2013)

    Google Scholar 

  9. Mohallick, I., Özgöbek, Ö.: Exploring privacy concerns in news recommendation systems. In: Proceedings of the International Conference on Web Intelligence (WI ‘17). ACM, New York, NY, USA, 2017, 1054–1061.

  10. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)

    Article  Google Scholar 

  11. Isinkaye, F.O., Folajimi, Y.O., Ojokoh, B.A.: Recommendation systems: principles, methods, and evaluation. Egypt. Inform. J. 16, 261–273 (2015)

    Article  Google Scholar 

  12. Tang, Q., Wang, J.: Privacy-preserving friendship-based recommendation systems. IEEE Trans. Dependable Secur. Comput. 5971, 1 (2016)

    Google Scholar 

  13. Huang, W., Liu, B., Tang, H.: Privacy protection for recommendation system: a survey. J. Phys: Conf. Ser. 1325, 012087 (2019)

    Google Scholar 

  14. Al-Nazzawi T.S, Alotaibi R.M, Hamza N.: Toward privacy protection for location-based recommendation systems: a survey of the state-of-the-art. In 1st IEEE International Conference on Computer Applications & Information Security (ICCAIS), 2018, 1–7.

  15. Feng, C., Khan, M., Rahman, A.U., Ahmad, A.: News recommendation systems - accomplishments, challenges & future directions. IEEE. Access 8, 16702–16725 (2020). https://doi.org/10.1109/ACCESS.2020.2967792

    Article  Google Scholar 

  16. Xu, K., Yan, Z.: Privacy protection in mobile recommendation systems: a survey. In: Wang G., Ray I., Alcaraz Calero J., Thampi S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. Lecture Notes in Computer Science, 2016, 10066.

  17. Elnabarawy, I, Jiang, W., Wunsch, D.C.: Survey of privacy-preserving collaborative filtering. arXiv preprint. 2020, arXiv:2003.08343.

  18. Aumann, Y., Lindell, Y.: Security Against covert adversaries: efficient protocols for realistic adversaries. In: Vadhan S.P. (eds) Theory of Cryptography. TCC. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2007, 4392.

  19. Bai, X., Wang, M., Lee, I., Yang, Z., Kong, X., Xia, F.: Scientific paper recommendation: a survey. IEEE Access 7, 9324–9339 (2019)

    Article  Google Scholar 

  20. Jawaheer, G., Szomszor, M., Kostkova, P.: Comparison of implicit and explicit feedback from an online music recommendation service, ACM Conference, 2010, 47–51.

  21. Friedman, A., Knijnenburg, B.P, Vanhecke, K., Martens, L., Berkovsky, S.: Privacy aspects of recommendation systems. In: Recommendation systems Handbook, Springer, Boston, MA, 2015, 649–688.

  22. Kashef, R.: Enhancing the role of large-scale recommendation systems in the IoT context. In: IEEE Access, vol. 8, pp. 178248-178257, 2020.

  23. Wang, C., Zheng, Y., Jiang, J., Ren, K.: Toward privacy-preserving personalized recommendation services. Engineering, 2018, 4:21-28.

  24. Gadanho, S.C, Lhuillier, N.: Addressing uncertainty in implicit Preferences, RecSys’ 07, ACM Conference, 2007, 97.

  25. Wang, J., Tang, Q.: Recommendation systems and their security concerns. http://158.64.76.181/bitstream/10993/30100/1/1108.pdf, 2015.

  26. Zare, A., Motadel, M.R., Jalali, A.: Presenting a hybrid model in social networks recommendation system architecture development. AI & Soc. 35, 469–483 (2020)

    Article  Google Scholar 

  27. Burke, R.: Hybrid recommendation systems: survey and experiments. User modeling and user-adapted interaction. 2002, 12.

  28. Li, G., Chen, Q.: Exploiting explicit and implicit feedback for personalized ranking, Math. Probl. Eng., 2016: 1–11.

  29. Saleem, Y., Rehmani, M.H., Crespi, N., Minerva, R.: Parking recommender system privacy preservation through anonymization and differential privacy. Eng. Rep. 3(2), 12297 (2021)

    Article  Google Scholar 

  30. Luo, Z., Chen, S., Li, A.: A distributed anonymization scheme for privacy-preserving recommendation systems. IEEE 4th International Conference on Software Engineering and Service Science, 491–494. (2013)

  31. Sweeney, L. k-anonymity: A model for protecting privacy. Int J Uncertain Fuzziness and Knowl- Based Syst. 10(5):557-570. (2002)

  32. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. Proc. of Int. Conf. Data Eng. 206, 24 (2006)

    Google Scholar 

  33. Li, N., Li, T., Venkatasubramanian, S.: T- Closeness: Privacy beyond k-anonymity and l-diversity. Paper presented at: Proceedings of the IEEE 23rd International Conference on Data Engineering; 106-115 (2007)

  34. Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM symposium on Applied computing. 2005, pp. 791-795.

  35. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds) Theory and Applications of Models of Computation. TAMC 2008, 4978

  36. Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li, Y. et al.: A survey on federated learning systems: vision, hype, and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering, 2021.

  37. Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W., Gao, Y.: A survey on federated learning. Knowl.-Based Syst. 216, 106775 (2021)

    Article  Google Scholar 

  38. McMahan, H.B., Moore, E., Ramage, D., Arcas, B.A.: Federated learning of deep networks using model averaging. arXiv preprint arXiv: 2016, 1602.05629.

  39. Zhao, Y., Chow, S.S.M.: Privacy-preserving collaborative filtering from asymmetric randomized encoding. In: Financial Cryptography and Data Security, R. Bohme and T. Okamoto (Eds.), LNCS, 8975: 459–477. (2015)

  40. Goldreich, O.: Foundations of cryptography: a primer. Found. Trend Theor. Comput. Sci., 11–116. (2005)

  41. Bhatia, T., Verma, A.K., Sharma, G.: Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurrency and Comput.: Practice and Exp. 32(5), e5520 (2020)

    Article  Google Scholar 

  42. Sehrawat, V.S., Desmedt, Y.: Access structure hiding secret sharing from novel set systems and vector families. In: International Computing and Combinatorics Conference, Springer, Cham, 2020, 246–261.

  43. Zhang, Y., Deng, R.H., Xu, S., Sun, J., Li, Q., Zheng, D.: Attribute-based encryption for cloud computing access control: a survey. ACM Comput. Surv. 53(4), 1–41 (2020)

    Google Scholar 

  44. Partala, J., Nguyen, T.H., Pirttikangas, S.: Non-interactive zero-knowledge for Blockchain: a survey. In IEEE Access 8, 227945–227961 (2020)

    Article  Google Scholar 

  45. Batmaz, Z., Kaleli, C.: Methods of privacy-preserving in collaborative filtering. 2nd international conference on computer science and engineering, 261–266. (2017)

  46. Li, J., Kuang, X., Lin, S., Ma, X., Tang, Y.: Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inform. Sci. 526, 166–179 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  47. Ogunseyi, T.B., Bo, T.: Fast decryption algorithm for paillier homomorphic cryptosystem. In: 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS) (pp. 803–806). IEEE.

  48. Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. (CSUR) 51(4), 1–35 (2018)

    Article  Google Scholar 

  49. Ahila, S.S., Shunmuganathan, K.L.: State Of art in homomorphic encryption schemes. Int. J. Eng. Res. Appl. 4(2), 37–43 (2014)

    Google Scholar 

  50. Pisa, P.S., Abdalla, M., Duarte OCMB.: Somewhat homomorphic encryption scheme for arithmetic operations on large integers. In: 2012 Global Information Infrastructure and Networking Symposium (GIIS) (pp. 1-8). IEEE.

  51. Park, J., Tibouchi, M.: SHECS-PIR: Somewhat homomorphic encryption-based compact and scalable private information retrieval. In: Chen L., Li N., Liang K., Schneider S. (eds) Computer Security – ESORICS 2020. ESORICS 2020. Lecture Notes in Computer Science, vol 12309. Springer, Cham.

  52. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 2011, pp. 113-124.

  53. Xiong, L., Dong, D., Xia, Z., Chen, X.: High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. In IEEE Access 6, 60635–60644 (2018)

    Article  Google Scholar 

  54. Ciocan, A., Costea, S., Ţăpuş, N.: Implementation and optimization of a somewhat homomorphic encryption scheme. In:14th RoEduNet International Conference-Networking in Education and Research, 2015, pp. 198–202. IEEE.

  55. Alloghani, M., Alani, M.M., Al-Jumeily, D., Baker, T., Mustafina, J., Hussain, A., Aljaaf, A.J.: A systematic review on the status and progress of homomorphic encryption technologies. J. Inform. Security and Appl. 48, 102362 (2019)

    Google Scholar 

  56. Yousuf, H., Lahzi, M., Salloum, S.A., Shaalan, K.: Systematic review on fully homomorphic encryption scheme and its application. Recent Advances in Intelligent Systems and Smart Applications, 537–551. (2021)

  57. Alharbi, A., Zamzami, H., Samkri, E.: Survey on homomorphic encryption and address of new trend. Int. J. Adv. Comput. Sci. Appl 11(7), 618–626 (2020)

    Google Scholar 

  58. Rahman, M.S., Khalil, I., Atiquzzaman, M., Yi, X.: Towards privacy-preserving AI-based composition framework in edge networks using fully homomorphic encryption. Eng. Appl. Artif. Intell. 94, 103737 (2020)

    Article  Google Scholar 

  59. Everything Explained Today, http://everything.explained.today/Secure_multi-party_computation/, accessed on 17th December 2020.

  60. Dugan, T., Zou, X.: A survey of secure multiparty computation protocols for privacy-preserving genetic tests. Proceedings. IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 173–182. (2016)

  61. Veugen, T., De Haan, R., Cramer, R., Muller, F.: A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations. IEEE Trans. Inf. Forensics Security 10, 445–457 (2015)

    Article  Google Scholar 

  62. Nuñez, D., Agudo, I., Lopez, J.: Proxy re-encryption: analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87, 193–209 (2017)

    Article  Google Scholar 

  63. Deng, H., Qin, Z., Wu, Q., Guan, Z., Zhou, Y.: Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511, 94–113 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  64. Sakurai, K., Nishide, T., Syalim, A.: Improved proxy re-encryption scheme for symmetric key cryptography. In: International Workshop on Big Data and Information Security (IWBIS), Jakarta, 105–111. (2017)

  65. Harn, L., Hsu, C., Zhang, M., He, T., Zhang, M.: Realizing secret sharing with general access structure. Inf. Sci. 367, 209–220 (2016)

    Article  MATH  Google Scholar 

  66. Beimel, A.: Secret-sharing schemes: a survey. In: Coding and Cryptology, Third International Workshop, IWCC, Qingdao, China, 1: 1–36. (2011)

  67. Chase, M.: Multi-authority attribute-based encryption. In: Theory of cryptography conference, 2007, pp. 515-534. Springer, Berlin, Heidelberg.

  68. Zheng, H., Shao, J., Wei, G.: Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw. Appl. 13, 1643–1655 (2020)

    Article  Google Scholar 

  69. Mohr, A.A.: Survey of zero-knowledge proofs with applications to cryptography. South. Illinois Univ. Carbondale, 1–12. (2008)

  70. Bouland, A., Chen, L., Holden, D., Thaler, J.: Vasudevan P N. On the power of statistical zero-knowledge. Annual Symposium on Foundations of Computer Science – Proceedings, 140, 708–719. (2017)

  71. Pass, I.R.: Lecture 18: Zero-Knowledge Proofs The formal definition Graph isomorphism. ReCALL, 1–5. (2009)

  72. Page, M.J., McKenzie, J.E., Bossuyt, P.M., Boutron, I., Hoffmann, T.C., Mulrow, C.D., Moher, D., et al.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Int. J. Surg. 88, 105906 (2021)

    Article  Google Scholar 

  73. Wright, C., Rumsey, K.: The strengths, weaknesses and promise of differential privacy as a privacy-protection framework. (2011)

  74. Oppermann, A., Yurchenko, A., Esche, M., Seifert, J.P.: Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology. In: International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 35-54. (2017)

  75. Yousuf, H., Lahzi, M., Salloum, S.A., Shaalan, K.: Systematic review on fully homomorphic encryption scheme and its application. Recent Adv. Intell. Syst. Smart Appl. 537-551. (2021)

  76. Chiou, S.Y.: A trustworthy online recommendation system based on social connections in a privacy-preserving manner. Multimed. Tools Appl. 76(7), 9319–9336 (2017)

    Article  Google Scholar 

  77. Cheng, H., Qian, M., Li, Q., Zhou, Y., Chen, T.: An efficient privacy-preserving friend recommendation scheme for social network. IEEE Access 6, 56018–56028 (2018)

    Article  Google Scholar 

  78. Sánchez, P., Bellogín, A.: Point-of-interest recommender systems based on location-based social networks: a survey from an experimental perspective. ACM Computing Surveys (CSUR), (2022)

  79. Guy, I.: Social recommender systems. In: Recommender systems handbook. Springer, New York, NY. 835-870. (2022)

  80. Zhang, M., Chen, Y., Lin, J.: A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment. IEEE Internet of Things J. 8(13), 10830–10842 (2021)

    Article  Google Scholar 

  81. Zhang, B., Wang, N., Jin, H.: Privacy concerns in online recommendation systems: influences of control and user data input. In: 10th Symposium on Usable Privacy and Security, 159-173. (2014)

  82. Rifa-Pous, H., Herrera-Joancomartí, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 3(1), 31–48 (2011)

    Article  Google Scholar 

  83. Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography with constant computational overhead. In Proceedings of the fortieth annual ACM symposium on Theory of computing, 433-442. (2008)

  84. Alani, M.: Applications of machine learning in cryptography: a survey. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019, 23-27.

  85. Slokom, M., Hanjalic, A., Larson, M.: Towards user-oriented privacy for recommender system data: a personalization-based approach to gender obfuscation for user profiles. Inform. Process. Manag. 58(6), 102722 (2021)

    Article  Google Scholar 

  86. Ogunseyi, T.B., Avoussoukpo, C.B., Jiang, Y.: Privacy-preserving matrix factorization for cross-domain recommendation. IEEE Access 9, 91027–91037 (2021)

    Article  Google Scholar 

  87. Kim, J., Koo, D., Kim, Y., Yoon, H., Shin, J., Kim, S.: Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption. ACM Trans. Privacy and Security (TOPS) 21(4), 1–30 (2018)

    Article  Google Scholar 

  88. Zhang, G., Qi, L., Zhang, X., Xu, X., & Dou, W. (2021). Point-of-Interest recommendation with user’s privacy preserving in an IoT environment. Mobile Netw. Appl. 1-16.

  89. Dou, K., Guo, B., Kuang, L.: A privacy-preserving multimedia recommendation in the context of social networks based on weighted noise injection. Multimed. Tools Appl. 78(19), 26907–26926 (2019)

    Article  Google Scholar 

  90. Feng, J., Rong, C., Sun, F., Guo, D., Li, Y.: PMF: a privacy-preserving human mobility prediction framework via federated learning. Proceed. ACM on Interact. Mobile, Wearable and Ubiquitous Technol. 4(1), 1–21 (2020)

    Article  Google Scholar 

  91. Chen, C., Zhou, J., Wu, B., Fang, W., Wang, L., Qi, Y., Zheng, X.: Practical privacy-preserving POI recommendation. ACM Trans. Intell. Syst. Technol. (TIST) 11(5), 1–20 (2020)

    Article  Google Scholar 

  92. Li, M., Zeng, Y., Guo, Y., & Guo, Y.: a movie recommendation system based on differential privacy protection. Security and Commun. Netw. (2020)

  93. Chen, C., Li, L., Wu, B., Hong, C., Wang, L., & Zhou, J.: Secure social recommendation based on secret sharing. arXiv preprint arXiv:2002.02088. (2020)

  94. Yu, B., Zhou, C., Zhang, C., Wang, G., Fan, Y.: A privacy-preserving multi-task framework for knowledge graph enhanced recommendation. IEEE Access 8, 115717–115727 (2020)

    Article  Google Scholar 

  95. Kuang, L., Tu, S., Zhang, Y., Yang, X.: Providing privacy preserving in next POI recommendation for Mobile edge computing. J. Cloud Comput. 9(1), 1–11 (2020)

    Article  Google Scholar 

  96. Gao, C., Huang, C., Yu, Y., Wang, H., Li, Y., Jin, D.: Privacy-preserving cross-domain location recommendation. Proceed. ACM on Interact. Mobile, Wearable and Ubiquitous Technol. 3(1), 1–21 (2019)

    Google Scholar 

  97. Gao, C., Chen, X., Feng, F., Zhao, K., He, X., Li, Y., Jin, D.: Cross-domain recommendation without sharing user-relevant data. In The world wide web conference (pp. 491-502). (2019)

  98. Bhatia, T., Verma, A.K., Sharma, G.: Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurrency and Comput.: Practice and Exp. 32(5), e5520 (2020)

    Article  Google Scholar 

  99. Yang, D., Qu, B., Cudré-Mauroux, P.: Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans. Knowl. Data Eng. 31(3), 507–520 (2018)

    Article  Google Scholar 

  100. Meng, S., Qi, L., Li, Q., Lin, W., Xu, X., Wan, S.: Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. Future Gen. Comput. Syst. 96, 324–335 (2019)

    Article  Google Scholar 

  101. Tang, W., Zhang, K., Ren, J., Zhang, Y., Shen, X.S.: Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. Inform. Sci. 527, 477–492 (2020)

    Article  Google Scholar 

  102. Ravi, L., Subramaniyaswamy, V., Devarajan, M., et al.: SECRECSY: a secure framework for enhanced privacy-preserving location recommendations in cloud environment. Wireless Personal Commun. 108(3), 1869–1907 (2019)

    Article  Google Scholar 

  103. Yin, C., Ju, X., Yin, Z., Wang, J.: (2019) Location recommendation privacy protection method based on location sensitivity division. EURASIP J. Wireless Commun. Netw. 1, 1–13 (2019)

    Google Scholar 

  104. Xu, C., Wang, J., Zhu, L., Zhang, C., Sharif, K.: PPMR a privacy-preserving online medical service recommendation scheme in eHealthcare system. IEEE Internet of Things J. 6, 5665-5673 (2019)

  105. Liu, A., Wang, W., Li, Z., Liu, G., Li, Q., Zhou, X., & Zhang, X.: A privacy-preserving framework for trust-oriented point-of-interest recommendation. IEEE Access6, 393-404. (2017)

  106. Wang, X., Nguyen, M., Carr, J., Cui, L., Lim, K.: A group preference-based privacy-preserving POI recommender system. ICT Exp. 6(3), 204–208 (2020)

    Article  Google Scholar 

  107. Zhang, J.D., Chow, C.Y.: Enabling probabilistic differential privacy protection for location recommendations. IEEE Trans. Services Comput. 14(2), 426–440 (2018)

    Article  Google Scholar 

  108. Tang, Q., Wang, J.: Privacy- preserving friendship-based recommender systems. IEEE Trans. Dependable and Secure Comput. 15(5), 784–796 (2016)

    Article  Google Scholar 

  109. Huang, Z., Hong, C., Lu, W. J., Weng, C., & Qu, H.: More efficient secure matrix multiplication for unbalanced recommender systems. IEEE Trans. Dependable and Secure Comput. (2021)

  110. Badsha, S., Yi, X., Khalil, I., Liu, D., Nepal, S., Bertino, E., & Lam, K. Y.: Privacy-preserving location-aware personalized web service recommendations. IEEE Trans. Services Comput. (2018)

  111. Shu, J., Jia, X., Yang, K., Wang, H.: Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans. Services Comput. 14(1), 235–247 (2018)

    Google Scholar 

  112. Zhou, P., Zhou, Y., Wu, D., Jin, H.: Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks. IEEE Trans. Multimed. 18, 1217–1229 (2016)

    Article  Google Scholar 

  113. Polatidis, N., Georgiadis, C.K., Pimenidis, E., Mouratidis, H.: Privacy-preserving collaborative recommendations based on random perturbations. Exp. Syst. Appl. 71, 18–25 (2017)

    Article  Google Scholar 

  114. Peng, C., He, D., Chen, J., Kumar, N., Khan, M.K.: EPRT: an efficient privacy-preserving medical service recommendation and trust discovery scheme for ehealth system. ACM Trans. Internet Technol. (TOIT) 21(3), 1–24 (2021)

    Article  Google Scholar 

  115. Xu, C., Wang, J., Zhu, L., Sharif, K., Zhang, C., Zhang, C.: Enabling privacy-preserving multi-level attribute-based medical service recommendation in eHealthcare systems. Peer-to-Peer Netw. Appl. 14(4), 1841–1853 (2021)

    Article  Google Scholar 

  116. Meng, X., Wang, S., Shu, K., Li, J., Chen, B., Liu, H., Zhang, Y.: Towards privacy-preserving social recommendation under personalized privacy settings. World Wide Web 22(6), 2853–2881 (2019)

    Article  Google Scholar 

  117. Ma, X., Li, H., Ma, J., Jiang, Q., Gao, S., Xi, N., Lu, D.: APPLET: a privacy-preserving framework for location-aware recommender system. Sci. China Inform. Sci. 60(9), 1–16 (2017)

    Article  Google Scholar 

  118. Badsha, S., Yi, X., Khalil, I.: A practical privacy-preserving recommender system. Data Sci. Eng. 1(3), 161–177 (2016)

    Article  Google Scholar 

  119. Liu, A., Shen, X., Xie, H., Li, Z., Liu, G., Xu, J., Wang, F.L.: Privacy-preserving shared collaborative web services QoS prediction. J. Intell. Inform. Syst. 54(1), 205–224 (2020)

    Article  Google Scholar 

  120. Wang, Y., Tian, Y., Yin, X., Hei, X.: A trusted recommendation scheme for privacy protection based on federated learning. CCF Trans. Netw. 3(3), 218–228 (2020)

    Article  Google Scholar 

  121. Yin, C., Shi, L., Sun, R., Wang, J.: Improved collaborative filtering recommendation algorithm based on differential privacy protection. J. Supercomput. 76(7), 5161–5174 (2020)

    Article  Google Scholar 

  122. Friedman, A., Berkovsky, S., Kaafar, M.A.: A differential privacy framework for matrix factorization recommender systems. User Model. User-Adapted Interact. 26(5), 425–458 (2016)

    Article  Google Scholar 

  123. Shu, J., & Jia, X. (2016). Secure task recommendation in crowdsourcing. In: 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.

  124. Zhou, P., Wang, K., Guo, L., Gong, S., Zheng, B.: A privacy-preserving distributed contextual federated online learning framework with big data support in social recommender systems. IEEE Trans. Knowl. Data Eng. 33(3), 824–838 (2019)

    Google Scholar 

  125. Yin, H., Xiong, Y., Deng, T., Deng, H., Zhu, P.: A privacy-preserving and identity-based personalized recommendation scheme for encrypted tasks in crowdsourcing. IEEE Access 7, 138857–138871 (2019)

    Article  Google Scholar 

  126. Wang, X., Yang, H., Lim, K.: Privacy-preserving POI recommendation using nonnegative matrix factorization. In: 2018 IEEE symposium on privacy-aware computing (pp. 117-118). (2017)

  127. Badsha, S., Yi, X., Khalil, I., Liu, D., Nepal, S., Lam, K.Y.: Privacy-preserving user-based web service recommendations. IEEE Access 6, 56647–56657 (2018)

    Article  Google Scholar 

  128. Kim, J.S., Kim, J.W., Chung, Y.D.: Successive point-of-interest recommendation with local differential privacy. IEEE Access 9, 66371–66386 (2021)

    Article  Google Scholar 

  129. Jiang, J.Y., Li, C.T., Lin, S.D.: Towards a more reliable privacy-preserving recommender system. Inform. Sci. 482, 248–265 (2019)

    Article  Google Scholar 

  130. Xu, K., Zhang, W., Yan, Z.: A privacy-preserving mobile application recommender system based on trust evaluation. J. Comput. Sci. 26, 87–107 (2018)

    Article  Google Scholar 

  131. Wang, W., Wang, S., & Huang, J.: Privacy Preservation for Friend-Recommendation Applications. Security and Communication Networks, (2018)

  132. Zhang, S., Li, X., Liu, H., Lin, Y., Sangaiah, A.K.: A privacy-preserving friend recommendation scheme in online social networks. Sustain. Cities Soc. 38, 275–285 (2018)

    Article  Google Scholar 

  133. Li, D., Chen, C., Lv, Q., Shang, L., Zhao, Y., Lu, T., Gu, N.: An algorithm for efficient privacy-preserving item-based collaborative filtering. Future Gen. Comput. Syst. 55, 311–320 (2016)

    Article  Google Scholar 

  134. Tang, Q., Wang, H.: Privacy- preserving hybrid recommender system. In Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (pp. 59-66). (2017)

  135. Ammad-Ud-Din, M., Ivannikova, E., Khan, S. A., Oyomno, W., Fu, Q., Tan, K. E., Flanagan, A.: Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv preprint arXiv:1901.09888. (2019)

  136. Ali, W., Kumar, R., Deng, Z., Wang, Y., Shao, J.: A federated learning approach for privacy protection in context-aware recommender systems. Comput. J. 64(7), 1016–1027 (2021)

    Article  MathSciNet  Google Scholar 

  137. Tan, B., Liu, B., Zheng, V., Yang, Q.: A federated recommender system for online services. In: Fourteenth ACM Conference on Recommender Systems (pp. 579-581). (2020)

  138. Qin, J., Liu, B., Qian, J.: A novel privacy-preserved recommender system framework based on federated learning. In: 2021 The 4th International Conference on Software Engineering and Information Management (pp. 82-88). (2021)

  139. Qin, Y., Li, M., Zhu, J.: Privacy- preserving federated learning framework in multimedia courses recommendation. Wireless Netw, 1-10. (2021)

  140. Casino, F., Patsakis, C., Puig, D., Solanas, A.: On privacy-preserving collaborative filtering: Current trends, open problems, and new issues. In: 2013 IEEE 10th International Conference on e-Business Engineering (pp. 244-249). IEEE. (2013)

  141. Zhang, S., Ford, J., Makedon, F.: A privacy-preserving collaborative filtering scheme with two-way communication. In: Proceedings of the 7th ACM Conference on Electronic Commerce (pp. 316-323). (2006)

  142. Jeckmans, A. J., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R. L., Tang, Q.: Privacy in recommender systems. In: Social media retrieval (pp. 263-281). Springer, London. (2013)

  143. Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., Yu, H.: Federated learning. Synthesis Lectures on Artificial Intell. Mach. Learn. 13(3), 1–207 (2019)

    Article  Google Scholar 

  144. Trienes, J., Cano, A. T., Hiemstra, D.: Recommending users: whom to follow on federated social networks. arXiv preprint arXiv:1811.09292. (2018)

  145. AbdulRahman, S., Tout, H., Ould-Slimane, H., Mourad, A., Talhi, C., Guizani, M.: A survey on federated learning: the journey from centralized to distributed on-site learning and beyond. IEEE Internet of Things J. 8(7), 5476–5497 (2020)

    Article  Google Scholar 

  146. Rahman, K.J., Ahmed, F., Akhter, N., Hasan, M., Amin, R., Aziz, K.E., Islam, A.N.: Challenges, applications and design aspects of federated learning: A survey. IEEE Access 9, 124682–124700 (2021)

    Article  Google Scholar 

  147. Mahmud, M.S., Huang, J.Z., Salloum, S., Emara, T.Z., Sadatdiynov, K.: A survey of data partitioning and sampling methods to support big data analysis. Big Data Mining and Anal. 3(2), 85–101 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

The authors will like to appreciate the reviewers for their valuable comments in making the manuscript better. This work is supported by Yibin University, Sichuan Province.

The authors declare that they have no conflict of interest or financial conflicts to disclose.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taiwo Blessing Ogunseyi.

Ethics declarations

Data availability statements

Data sharing is not applicable to this article as no new datasets were generated or analyzed during the current study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ogunseyi, T.B., Avoussoukpo, C.B. & Jiang, Y. A systematic review of privacy techniques in recommendation systems. Int. J. Inf. Secur. 22, 1651–1664 (2023). https://doi.org/10.1007/s10207-023-00710-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00710-1

Keywords

Navigation