Skip to main content

Distributed Differential Privacy Protection System for Personalized Recommendation

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1210))

Included in the following conference series:

  • 1149 Accesses

Abstract

Personalized recommendation systems become increasingly popular and have been widely applied in various fields nowadays. The release of users’ private data is required in order to provide users recommendations with high accuracy, yet this has put the users in danger. Unfortunately, existing privacy preserving methods are either developed under trusted server settings with impractical private recommendation systems or lack of strong privacy guarantees.

In this paper, we propose a new scheme that can achieve a better balance between security and usability, effectively solving the above problem. The innovation lies in improving the method of adding noise to the Laplace mechanism in local differential privacy. It adopts a univariate noise increase method, combined with wavelet clustering and multiple cluster identification methods to ensure the lowest data distortion rate. At the same time, it is safe to ensure the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Friedman, A., Schuster, A.: Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA (2010)

    Google Scholar 

  2. Polat, H., Du, W.: Achieving private recommendations using randomized response techniques. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 637–646. Springer, Heidelberg (2006). https://doi.org/10.1007/11731139_73

    Chapter  Google Scholar 

  3. Ning, X., Desrosiers, C., Karypis, G.: A comprehensive survey of neighborhood-based recommendation methods. Comput. Sci. Eng. 37–76 (2015)

    Google Scholar 

  4. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  5. Wanyu, D., Qinghua, Z., Lin, C.: Study on the rapid learning method of neural network. Chinese J. Comput. 33(2), 279–287 (2010)

    Article  MathSciNet  Google Scholar 

  6. Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. J. Mach. Learn. Res. 12, 1069–1109 (2009)

    Google Scholar 

  7. Chen, L., Yu, T., Chirkova, R.: WaveCluster with differential privacy. In: International Conference on Information and Knowledge Management, Proceedings, Melbourne, Australia (2015)

    Google Scholar 

  8. Berlioz, A., Friedman, A., Kaafar, M.A., Boreli, R., Berkovsky, S.: Applying differential privacy to matrix factorization. In: Proceedings of the 9th ACM Conference on Recommender Systems, Vienna, Austria (2015)

    Google Scholar 

  9. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  10. Zhao, R., Mao, E.: Semi-random projection for dimensionality reduction and extreme learning machine in high-dimensional space. IEEE Comput. Intell. Mag. 10, 30–41 (2015)

    Google Scholar 

  11. Bassily, R., Smith, A.: Local, private, efficient protocols for succinct histograms. In: STOC (2015)

    Google Scholar 

  12. Duchi, J.C., Jordan, M., Wainwright, M.J.: Privacy aware learning. J. ACM 61(6), 38:1–38:57 (2014)

    Google Scholar 

  13. Erlingsson, Ú., Korolova, A., Pihur, V.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: CCS, pp. 1054–1067 (2014)

    Google Scholar 

  14. Fanti, G., Pihur, V., Erlingsson, Ú.: Building a RAPPOR with the unknown: privacy-preserving learning of associations and data dictionaries. In: Proceedings of Privacy Enhancing Technology, pp. 41–61 (2016)

    Google Scholar 

  15. NguyĂŞn, T.T., Xiao, X., Yang, Y., Hui, S.C.: Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy (2016). https://arxiv.org/abs/1606.05053

  16. Liu, B., Xia, S.-X., Meng, F.-R., Zhou, Y.: Manifold regularized extreme learning machine. Neural Comput. Appl. 27(2), 255–269 (2015). https://doi.org/10.1007/s00521-014-1777-8

    Article  Google Scholar 

  17. Li, C., Sánchez, R.V., Zurita, G.V., Cerrada, M.: Multimodal deep support vector classification with homologous features and its application to gearbox fault diagnosis. Neurocomputing 168 (2015)

    Google Scholar 

  18. Dwork, C., Nissim, K.: Privacy-preserving datamining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 528–544. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_32

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lv, Z. et al. (2020). Distributed Differential Privacy Protection System for Personalized Recommendation. In: Tian, Y., Ma, T., Khan, M. (eds) Big Data and Security. ICBDS 2019. Communications in Computer and Information Science, vol 1210. Springer, Singapore. https://doi.org/10.1007/978-981-15-7530-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7530-3_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7529-7

  • Online ISBN: 978-981-15-7530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics