Skip to main content
Log in

Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In our connected world, recommender systems have become widely known for their ability to provide expert and personalized referrals to end-users in different domains. The rapid growth of social networks has given a rise to a new kind of systems, which have been termed “social recommender service”. In this context, a software as a service recommender system can be utilized to extract a set of suitable referrals for certain users based on the data collected from the personal profiles of other end-users within a social structure. However, preserving end-users privacy in social recommender services is a very challenging problem that might prevent privacy concerned users from releasing their own profiles’ data or to be forced to release an erroneous data. Thus, both cases can detain the accuracy of extracted referrals. So in order to gain accurate referrals, the social recommender service should have the ability to preserve the privacy of end-users registered in their system. In this paper, we present a middleware that runs on the end-users’ side in order to conceal their profiles data when being released for the recommendation purposes. The computation of recommendation proceeds over this concealed data. The proposed middleware is equipped with a distributed data collection protocol along with two stage concealment process to give the end-users complete control over the privacy of their profiles. We will present an IPTV network scenario along with the proposed middleware. A number of different experiments were performed on real data which was concealed using our two stage concealment process to evaluate the achieved privacy and accuracy of the extracted referrals. As supported by the experiments, the proposed framework maintains the recommendations accuracy with a reasonable privacy level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Ardissono L, Kobsa A, Maybury M (2004) Personalized digital television: targeting programs to individual viewers, vol 6, Human-Computer Interaction Series. Kluwer Academic Publishers, Boston

    Book  Google Scholar 

  2. Beimel A, Nissim K, Omri E (2011) Distributed private data analysis: on simultaneously solving How and What. arXiv preprint arXiv:1103.2626

  3. Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. ACM, 128–138

  4. Canny J (2002) Collaborative filtering with privacy via factor analysis. Proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval. ACM, Tampere, pp 238–245

    Google Scholar 

  5. Canny J (2002) Collaborative filtering with privacy. Proceedings of the 2002 I.E. symposium on security and privacy. IEEE Computer Society 45

  6. Carbo J, Molina J, Davila J (2002) Trust management through fuzzy reputation. Int J Coop Inf Syst 12:135–155

    Article  Google Scholar 

  7. Commission E (2002) Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector. Official Journal L 201: 07

  8. Cranor LF (2003) ‘I didn’t buy it for myself’ privacy and ecommerce personalization. Proceedings of the 2003 ACM workshop on privacy in the electronic society. ACM, Washington

    Google Scholar 

  9. Directive E (1995) 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the EC 23: 6

  10. Domingo-Ferrer J (2009) Record linkage. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, US, pp 2353–2354

    Google Scholar 

  11. Dwork C (2006) Differential privacy. Automata, languages and programming. Springer, New York, pp 1–12

    Book  MATH  Google Scholar 

  12. Eichhorn BH, Hayre LS (1983) Scrambled randomized response methods for obtaining sensitive quantitative data. J Stat Plan Infer 7:307–316

    Article  Google Scholar 

  13. Elmisery AM, Botvich D (2011) An agent based middleware for privacy aware recommender systems in IPTV networks. In: Watada J, Phillips-Wren G, Jain LC, Howlett RJ (eds) Intelligent decision technologies, vol 10. Springer, Berlin, pp 821–832

    Chapter  Google Scholar 

  14. Elmisery A, Botvich D (2011) Private recommendation service for IPTV system. 12th IFIP/IEEE international symposium on integrated network management. IEEE, Dublin

    Google Scholar 

  15. Elmisery A, Botvich D (2011) Agent based middleware for maintaining user privacy in IPTV recommender services. 3rd international ICST conference on security and privacy in mobile information and communication systems. ICST, Aalborg

    Google Scholar 

  16. Elmisery A, Botvich D (2011) Privacy aware obfuscation middleware for mobile jukebox recommender services. The 11th IFIP conference on e-Business, e-Service, e-Society. IFIP, Kaunas

    Google Scholar 

  17. Elmisery A, Botvich D (2011) Privacy aware recommender service for IPTV networks. 5th FTRA/IEEE international conference on multimedia and ubiquitous engineering. IEEE, Crete

    Google Scholar 

  18. Elmisery A, Botvich D (2011) Agent based middleware for private data mashup in IPTV recommender services. 16th IEEE international workshop on computer aided modeling, analysis and design of communication links and networks. IEEE, Kyoto

    Google Scholar 

  19. Elmisery AM, Doolin K, Botvich D (2012) Privacy aware community based recommender service for conferences attendees. 16th international conference on knowledge-based and intelligent information & engineering systems, vol 243. Ios Press, San Sebastian, pp 519–531

    Google Scholar 

  20. Esma A (2008) Experimental demonstration of a hybrid privacy-preserving recommender system. In: Gilles B, Jose MF, Flavien Serge Mani O, Zbigniew R (eds.) Vol. 0 161–170

  21. Gemmis MD, Iaquinta L, Lops P, Musto C, Narducci F, Semeraro G (2009) Preference learning in recommender systems. European conference on machine learning and principles and practice of knowledge discovery in databases (ECML/PKDD). ACM, Slovenia

    Google Scholar 

  22. Golbeck J, Hendler J (2006) FilmTrust: movie recommendations using trust in web-based social networks. Consumer communications and networking conference, 2006. CCNC 2006. 3rd IEEE, Vol. 1 282–286

  23. Herlocker JL, Konstan JA, Terveen LG, Riedl JT (2004) Evaluating collaborative filtering recommender systems. ACM Trans Inf Syst 22:5–53

    Article  Google Scholar 

  24. Hong T, Tsamis D (2006) Use of knn for the netflix prize. http://www.stanford.edu/class/cs229/proj2006/HongTsamis-KNNForNetflix.pdf

  25. Huang Z, Chen H, Zeng D (2004) Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans Inf Syst 22:116–142

    Article  Google Scholar 

  26. Huang Z, Du W, Chen B (2005) Deriving private information from randomized data. Proceedings of the 2005 ACM SIGMOD international conference on management of data. ACM, Baltimore, pp 37–48

    Google Scholar 

  27. Indyk P, Motwani R (1998) Approximate nearest neighbors: towards removing the curse of dimensionality. Proceedings of the thirtieth annual ACM symposium on theory of computing. ACM, Dallas, pp 604–613

    MATH  Google Scholar 

  28. Jannach D, Zanker M, Felfernig A, Friedrich G (2010) Recommender systems: an introduction. Cambridge University Press, Cambridge

    Book  Google Scholar 

  29. Jeckmans AJ, Beye M, Erkin Z, Hartel P, Lagendijk RL, Tang Q (2013) Privacy in recommender systems. Social media retrieval. Springer, New York, pp 263–281

    Book  Google Scholar 

  30. Kargupta H, Datta S, Wang Q, Sivakumar K (2003) On the privacy preserving properties of random data perturbation techniques. Proceedings of the third IEEE international conference on data mining. IEEE Computer Society 99

  31. Kawazoe K, Kakinuma R, Haneda Y, Minoura D, Minamoto S, Ishimoto H (2007) Platform application technology using the next generation network. Technical Review. NTT

  32. Kelly D, Teevan J (2003) Implicit feedback for inferring user preference: a bibliography. SIGIR Forum 37:18–28

    Article  Google Scholar 

  33. Konstan JA (2004) Introduction to recommender systems: algorithms and evaluation. ACM Trans Inf Syst (TOIS) 22:1–4

    Article  Google Scholar 

  34. Lam S, Herlocker J (2006) MovieLens data sets. Department of Computer Science and Engineering at the University of Minnesota

  35. Lewis DD (1998) Naive (Bayes) at forty: the independence assumption in information retrieval. proceedings of the 10th European conference on machine learning. Springer, New York, pp 4–15

    Google Scholar 

  36. Lin J-L, Cheng Y-W (2009) Privacy preserving itemset mining through noisy items. Expert Syst Appl 36:5711–5717

    Article  Google Scholar 

  37. Lin J-L, Liu JY-C (2007) Privacy preserving itemset mining through fake transactions. Proceedings of the 2007 ACM symposium on applied computing. ACM, Seoul, pp 375–379

    Google Scholar 

  38. Margulis ST (2003) On the status and contribution of westin’s and altman’s theories of privacy. J Soc Issues 59:411–429

    Article  Google Scholar 

  39. McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, Paris, pp 627–636

    Google Scholar 

  40. Miller BN, Konstan JA, Riedl J (2004) PocketLens: toward a personal recommender system. ACM Trans Inf Syst 22:437–476

    Article  Google Scholar 

  41. Narayanan A, Shmatikov V (2008) Robust De-anonymization of large sparse datasets. Proceedings of the 2008 I.E. symposium on security and privacy. IEEE Computer Society

  42. Nejdl W, Wolpers M, Siberski W, Schmitz C, Schlosser M, Brunkhorst I (2003) Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks. Proceedings of the 12th international conference on World Wide Web. ACM, Budapest, pp 536–543

    Google Scholar 

  43. Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. Proceedings of the thirty-ninth annual ACM symposium on theory of computing. ACM, 75–84

  44. Parameswaran R, Blough DM (2008) Privacy preserving data obfuscation for inherently clustered data. Int J Inf Comput Secur 2:4–26

    Google Scholar 

  45. Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. Proceedings of the third IEEE international conference on data mining. IEEE Computer Society625

  46. Polat H, Du W (2005) SVD-based collaborative filtering with privacy. Proceedings of the 2005 ACM symposium on applied computing. ACM, Santa Fe, pp 791–795

    Book  Google Scholar 

  47. Ricci F, Rokach L, Shapira B (2011) Introduction to recommender systems handbook. Recommender systems handbook. Springer, New York, pp 1–35

    MATH  Google Scholar 

  48. Shokri R, Pedarsani P, Theodorakopoulos G, Hubaux J-P (2009) Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. Proceedings of the third ACM conference on recommender systems. ACM, 157–164

  49. Thuraisingham B (2002) Data mining, national security, privacy and civil liberties. SIGKDD. Explor Newsl 4:1–5

    Article  Google Scholar 

  50. Ziegler C-N, McNee SM, Konstan JA, Lausen G (2005) Improving recommendation lists through topic diversification. Proceedings of the 14th international conference on World Wide Web. ACM, Chiba, pp 22–32

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (2013R1A1A2061978)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seungmin Rho.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elmisery, A.M., Rho, S. & Botvich, D. Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service. Multimed Tools Appl 75, 14927–14957 (2016). https://doi.org/10.1007/s11042-014-2271-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2271-0

Keywords

Navigation