中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

Message Board

Respected readers, authors and reviewers, you can add comments to this page on any questions about the contribution, review, editing and publication of this journal. We will give you an answer as soon as possible. Thank you for your support!

Name
E-mail
Phone
Title
Content
Verification Code
Issue 2
Mar.  2018
Turn off MathJax
Article Contents
SONG Chun-zhi, DONG Xiao-lei, CAO Zhen-fu. Efficient verifiable privacy-preserving recommendation system[J]. Journal of East China Normal University (Natural Sciences), 2018, (2): 41-51, 62. doi: 10.3969/j.issn.1000-5641.2018.02.005
Citation: SONG Chun-zhi, DONG Xiao-lei, CAO Zhen-fu. Efficient verifiable privacy-preserving recommendation system[J]. Journal of East China Normal University (Natural Sciences), 2018, (2): 41-51, 62. doi: 10.3969/j.issn.1000-5641.2018.02.005

Efficient verifiable privacy-preserving recommendation system

doi: 10.3969/j.issn.1000-5641.2018.02.005
  • Received Date: 2017-06-25
  • Publish Date: 2018-03-25
  • To address the problem of privacy disclosure in traditional personalized recommendation systems, this paper proposes an efficient verifiable privacy-preserving recommendation system, which can provide user the way to verify the correctness of the resulting model of cloud computing under the premise of protecting user's data privacy. This paper uses ridge regression to find the best-fit linear curve of user's input data, and implements Yao's garbled circuit to realize the computation and the correctness verification of the recommendation model. The user and the cloud use a newly-devised privacy preserving data aggregation method named AGG (Aggregation) to replace public key homomorphic encryption used in most existing work, which can reduce the computational overhead of the user and the cloud, thus making the system more efficient. The security analysis and the efficiency analysis of the scheme are given at the end of the article.
  • loading
  • [1]
    ZHAO Z D, SHANG M S. User-based collaborative-filtering recommendation algorithms on hadoop[C]//Knowledge Discovery and Data Mining, WKDD'10, 3rd International Conference on. IEEE, 2010: 478-481.
    [2]
    邓爱林, 朱扬勇, 施伯乐.基于项目评分预测的协同过滤推荐算法[J].软件学报, 2003, 14(9):1621-1628. http://kns.cnki.net/KCMS/detail/detail.aspx?filename=rjxb200309017&dbname=CJFD&dbcode=CJFQ
    [3]
    SARWAR B, KARYPIS G, KONSTAN J, et al. Item-based collaborative filtering recommendation algorithms[C]//Proceedings of the 10th International Conference on World Wide Web. ACM, 2001: 285-295.
    [4]
    PAVLOV D, PENNOCK D M. A maximum entropy approach to collaborative filtering in dynamic, sparse, high-dimensional domains[C]//NIPS. 2002, 2: 1441-1448.
    [5]
    MARLIN B M. Modeling user rating profiles for collaborative filtering[C]//Advances in Neural Information Processing Systems. 2004: 627-634.
    [6]
    NIKOLAENKO V, IOANNIDIS S, WEINSBERG U, et al. Privacy-preserving matrix factorization[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, 2013: 801-812.
    [7]
    SHYONG K, FRANKOWSKI D, RIEDL J. Do you trust your recommendations? An exploration of security and privacy issues in recommender systems[M]//Emerging Trends in Information and Communication Security. Berlin: Springer, 2006: 14-29.
    [8]
    AÏMEUR E, BRASSARD G, FERNANDEZ J M, et al. Alambic:A privacy-preserving recommender system for electronic commerce[J]. International Journal of Information Security, 2008, 7(5):307-334. doi:  10.1007/s10207-007-0049-3
    [9]
    MCSHERRY F, MIRONOV I. Differentially private recommender systems: Building privacy into the net[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2009: 627-636.
    [10]
    MOBASHER B, BURKE R, BHAUMIK R, et al. Toward trustworthy recommender systems:An analysis of attack models and algorithm robustness[J]. ACM Transactions on Internet Technology (TOIT), 2007, 7(4):23-38. doi:  10.1145/1278366
    [11]
    POLAT H, DU W. Privacy-preserving collaborative filtering using randomized perturbation techniques[C]//IEEE Internatioal Conference on Data Mining. IEEE, 2005: 625-628.
    [12]
    GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st Annual ACM Symposium on Theory of Computing. 2009: 169-178.
    [13]
    YAO A C C. Protocols for secure computations[C]//Foundations of Computer Science, 1982, SFCS'08, 23rd Annual Symposium on. IEEE, 1982: 160-164.
    [14]
    YAO A C C. How to generate and exchange secrets[C]//Foundations of Computer Science, 1986, 27th Annual Symposium on. IEEE, 1986: 162-167.
    [15]
    GENNARO R, GENTRY C, PARNO B. Non-interactive verifiable computing: Outsourcing computation to untrusted workers[C]//Annual Cryptology Conference. Berlin: Springer, 2010: 465-482.
    [16]
    ZHOU J, CAO Z F, DONG X L, et al. Security and privacy for cloud-based IoT:Challenges[J]. IEEE Communications Magazine, 2017, 55(1):26-33. doi:  10.1109/MCOM.2017.1600363CM
    [17]
    NIKOLAENKO V, WEINSBERG U, IOANNIDIS S, et al. Privacy-preserving ridge regression on hundreds of millions of records[C]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013: 334-348.
    [18]
    PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999: 223-238.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)

    Article views (189) PDF downloads(402) Cited by()
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return