Skip to main content

Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11952))

Included in the following conference series:

Abstract

Safeguarding privacy of ratings assigned by users is an important issue for recommender systems. There are several existing protocols that allow a server to generate recommendations from homomorphically encrypted ratings, thereby ensuring privacy of rating data. After collecting the encrypted ratings, the server may require further interaction with each user, which is problematic in case some users were to go offline. To solve the offline user problem previous solutions use additional semi-honest third parties. In this paper, we propose a privacy-preserving recommender system that does not suffer from the offline user problem. Unlike previous works, our proposal does not require any additional third party. We demonstrate with the help of experiments that the time required to generate recommendations is efficient for practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 6, 734–749 (2005)

    Article  Google Scholar 

  2. Badsha, S., Yi, X., Khalil, I.: A practical privacy-preserving recommender system. Data Sci. Eng. 1(3), 161–177 (2016)

    Article  Google Scholar 

  3. Badsha, S., Yi, X., Khalil, I., Bertino, E.: Privacy preserving user-based recommender system. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 1074–1083. IEEE (2017)

    Google Scholar 

  4. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  5. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_18

    Chapter  Google Scholar 

  6. Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_29

    Chapter  Google Scholar 

  7. Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053443

    Chapter  Google Scholar 

  8. Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Inf. Process. Lett. 94(3), 137–143 (2005)

    Article  MathSciNet  Google Scholar 

  9. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  10. Erkin, Z., Beye, M., Veugen, T., Lagendijk, R.L.: Efficiently computing private recommendations. In: ICASSP, pp. 5864–5867 (2011)

    Google Scholar 

  11. Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur. 7(3), 1053–1066 (2012)

    Article  Google Scholar 

  12. Goldreich, O.: Secure multi-party computation (1998)

    Google Scholar 

  13. Goldreich, O., et al.: Foundations of cryptography-a primer. Found. Trends®Theor. Comput. Sci. 1(1), 1–116 (2005)

    Google Scholar 

  14. Groh, G., Ehmig, C.: Recommendations in taste related domains: collaborative filtering vs. social filtering. In: Proceedings of the 2007 International ACM Conference on Supporting Group Work, pp. 127–136. ACM (2007)

    Google Scholar 

  15. Guy, I., Zwerdling, N., Carmel, D., Ronen, I., Uziel, E., Yogev, S., Ofek-Koifman, S.: Personalized recommendation of social software items based on social relations. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 53–60. ACM (2009)

    Google Scholar 

  16. Jeckmans, A.J.P.: Cryptographically-enhanced privacy for recommender systems. University of Twente (2014)

    Google Scholar 

  17. Lerman, K.: Social networks and social information filtering on Digg. arXiv preprint cs/0612046 (2006)

    Google Scholar 

  18. McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the Netflix Prize contenders. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627–636. ACM (2009)

    Google Scholar 

  19. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  20. Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: GroupLens: an open architecture for collaborative filtering of netnews. In: Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work, pp. 175–186. ACM (1994)

    Google Scholar 

  21. Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the Tenth International World Wide Web Conference, WWW 2010, Hong Kong, China, 1–5 May 2001, pp. 285–295 (2001). https://doi.org/10.1145/371920.372071

  22. Sinha, R.R., Swearingen, K., et al.: Comparing recommendations made by online systems and friends. In: DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, vol. 106 (2001)

    Google Scholar 

  23. Tsiounis, Y., Yung, M.: On the security of ElGamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054019

    Chapter  Google Scholar 

  24. Yakut, I., Polat, H.: Arbitrarily distributed data-based recommendations with privacy. Data Knowl. Eng. 72, 239–256 (2012)

    Article  Google Scholar 

  25. Zhang, F., et al.: Privacy-aware smart city: a case study in collaborative filtering recommender systems. J. Parallel Distrib. Comput. 127, 145–159 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Pranav Verma , Anish Mathuria or Sourish Dasgupta .

Editor information

Editors and Affiliations

Appendices

A Similarity Computation

Cosine similarity is used here to show the similarity between two items. It computes similarity between rating vectors of two items using cosine of angle between the vectors, smaller angle represents more similarity.

figure aq

Algorithm 3 shows the similarity computation phase. Before executing these phases, the users would have been divided into groups and generated group keys for respective groups. The common key Y is available to all users. The server has computed the average rating of all items.

The similarity between two items \(\theta \) and \(\theta '\) is computed as:

$$\begin{aligned} s\left( \theta ,\theta '\right) = \frac{\sum _{i=1}^{n}r_{i,\theta }r_{i,\theta '}}{\sqrt{\sum _{i=1}^{n}r^{2}_{i,\theta }} \sqrt{ \sum _{i=1}^{n}r^{2}_{i,\theta '}}} \end{aligned}$$

B CBF-Based Recommendation

To generate recommendations, the server computes predicted ratings for all items and send them to the user. At the user end items with the highest ratings are shown to the user as recommended items list. The server sends predicted ratings encrypted under the target user’s public key so these predictions can be seen by the intended user only. In CBF-Based recommendations, for a user u the rating for item \(\theta \) is computed as:

$$\begin{aligned} RP_{u,\theta } = \frac{\sum _{j=1}^{m}r_{u,\theta } s\left( p_j, p_\theta \right) }{\sum _{j=1}^{m}s \left( p_j, p_\theta \right) } \end{aligned}$$

The user sends its encrypted ratings to the server, and the server computes numerator and denominator values of rating predictions for all items, encrypts them using the target user’s public key and sends back to the user. The user decrypts all predicted ratings and receives the recommendations. Algorithm 4 shows the detailed steps.

figure ar
figure as

C CF-Based Recommendation

To generate recommendations using CF-based technique, the data flow is similar to that of CBF-based technique with following equation for prediction:

$$\begin{aligned} RP_{u,\theta } = \frac{\bar{p}_\theta \sum _{j=1}^{m}s\left( p_\theta , p_j\right) + \sum _{j=1}^{m} \left( r_{u,j} - \bar{p}_j\right) s\left( p_\theta , p_j\right) }{\sum _{j=1}^{m}s\left( p_\theta , p_j\right) } \end{aligned}$$

Detailed steps are shown in Algorithm 5.

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, P., Mathuria, A., Dasgupta, S. (2019). Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. In: Garg, D., Kumar, N., Shyamasundar, R. (eds) Information Systems Security. ICISS 2019. Lecture Notes in Computer Science(), vol 11952. Springer, Cham. https://doi.org/10.1007/978-3-030-36945-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36945-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36944-6

  • Online ISBN: 978-3-030-36945-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics