Skip to main content

Data Security in Recommendation System Using Homomorphic Encryption

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1 ( ICTIS 2017)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 83))

Abstract

Cloud computing is like a daily routine now a day. Even though it has numbers of advantages in technical and business view, still there are some challenges there like data storage security, confidentiality and integrity. Main risk in cloud data is about to trust on cloud owner. Encrypted data is not useful for any computational process, so we cannot store as encrypted data. In recommendation system cloud plays very important role. Using homomorphic encryption, we can perform cloud data analyzation. This paper discusses about different homomorphic encryption technique and solution to recommendation system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Schafer, J.B., Konstan, J., Riedi, J.: Recommender systems in e-commerce. In: Proceedings of the 1st ACM conference on Electronic Commerce, pp. 158–166. ACM Press, New York (1999)

    Google Scholar 

  2. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, Florida, USA, pp. 99–106. IEEE, November 2003

    Google Scholar 

  3. Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. Society for Industrial Mathematics (2005)

    Google Scholar 

  4. Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. In Proceedings of the SIAM Data Mining (SDM 2005), Newport Beach, California, USA, April 2005

    Google Scholar 

  5. Aggarwal, C.C., Yu, P.S.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms, Chapter 2, pp. 11–52. Springer, New York (2008)

    Google Scholar 

  6. Han, S., Ng, W.K., Yu, P.S.: Privacy-preserving singular value decomposition. In: Proceedings of the 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China, IEEE, March–April 2009

    Google Scholar 

  7. Basu, A., Kikuchi, H., Vaidya, J.: Privacy-preserving weighted slope one predictor for item-based collaborative filtering. In: Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (TP-DIS 2011), Copenhagen, Denmark, July 2011

    Google Scholar 

  8. Zhang, X., Hong tao D.: Ensure data securiy in cloud stoarge. In: NCIS 2011, pp. 284–287

    Google Scholar 

  9. Vaidya, J., Yakut, I., Basu, A.: Efficient integrity verification for outsourced collaborative filtering. In: Data Mining (ICDM), IEEE (2014)

    Google Scholar 

  10. Kangavalli, R., Vagdevi, S.: A mixed homomorphic encryption scheme for secure data storage in cloud, IEEE (2015)

    Google Scholar 

  11. Ganatra, G., Kosta, Y.P., Panchal, G., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)

    Google Scholar 

  12. Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), pp. 248–251. Bangalore, India (2010)

    Google Scholar 

  13. Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)

    Article  Google Scholar 

  14. Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of mul-tilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theory Eng. 3(2), 332–337 (2011)

    Article  Google Scholar 

  15. Panchal, G., Panchal, D.: Solving np hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol 6(2), 1824–1827 (2015)

    Google Scholar 

  16. Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol 6(2), 1828–1831 (2015)

    Google Scholar 

  17. Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015)

    Google Scholar 

  18. Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015)

    Google Scholar 

  19. Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, pp. 1–6. AEEICB (2016)

    Google Scholar 

  20. Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer, New York (2016)

    Google Scholar 

  21. Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage, pp. 1–18. Springer (Multimedia Tools and Application), New York (2017)

    Google Scholar 

  22. Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)

    Google Scholar 

  23. Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)

    Google Scholar 

  24. Patel, J., Panchal, G.: An IOT based portable smart meeting space with real-time room occupancy. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)

    Google Scholar 

  25. Soni, K., Panchal, G.: Data security in recommendation system using homo-morphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)

    Google Scholar 

  26. Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)

    Google Scholar 

  27. Bhimani, P., Panchal, G.: Message delivery guarantee and status update of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)

    Google Scholar 

  28. Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)

    Google Scholar 

  29. Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurang Panchal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Soni, K., Panchal, G. (2018). Data Security in Recommendation System Using Homomorphic Encryption. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63673-3_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63672-6

  • Online ISBN: 978-3-319-63673-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics