Abstract
Safeguarding privacy of ratings assigned by users is an important issue for recommender systems. There are several existing protocols that allow a server to generate recommendations from homomorphically encrypted ratings, thereby ensuring privacy of rating data. After collecting the encrypted ratings, the server may require further interaction with each user, which is problematic in case some users were to go offline. To solve the offline user problem previous solutions use additional semi-honest third parties. In this paper, we propose a privacy-preserving recommender system that does not suffer from the offline user problem. Unlike previous works, our proposal does not require any additional third party. We demonstrate with the help of experiments that the time required to generate recommendations is efficient for practical applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 6, 734–749 (2005)
Badsha, S., Yi, X., Khalil, I.: A practical privacy-preserving recommender system. Data Sci. Eng. 1(3), 161–177 (2016)
Badsha, S., Yi, X., Khalil, I., Bertino, E.: Privacy preserving user-based recommender system. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 1074–1083. IEEE (2017)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_18
Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_29
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053443
Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Inf. Process. Lett. 94(3), 137–143 (2005)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Erkin, Z., Beye, M., Veugen, T., Lagendijk, R.L.: Efficiently computing private recommendations. In: ICASSP, pp. 5864–5867 (2011)
Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur. 7(3), 1053–1066 (2012)
Goldreich, O.: Secure multi-party computation (1998)
Goldreich, O., et al.: Foundations of cryptography-a primer. Found. Trends®Theor. Comput. Sci. 1(1), 1–116 (2005)
Groh, G., Ehmig, C.: Recommendations in taste related domains: collaborative filtering vs. social filtering. In: Proceedings of the 2007 International ACM Conference on Supporting Group Work, pp. 127–136. ACM (2007)
Guy, I., Zwerdling, N., Carmel, D., Ronen, I., Uziel, E., Yogev, S., Ofek-Koifman, S.: Personalized recommendation of social software items based on social relations. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 53–60. ACM (2009)
Jeckmans, A.J.P.: Cryptographically-enhanced privacy for recommender systems. University of Twente (2014)
Lerman, K.: Social networks and social information filtering on Digg. arXiv preprint cs/0612046 (2006)
McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the Netflix Prize contenders. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627–636. ACM (2009)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: GroupLens: an open architecture for collaborative filtering of netnews. In: Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work, pp. 175–186. ACM (1994)
Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the Tenth International World Wide Web Conference, WWW 2010, Hong Kong, China, 1–5 May 2001, pp. 285–295 (2001). https://doi.org/10.1145/371920.372071
Sinha, R.R., Swearingen, K., et al.: Comparing recommendations made by online systems and friends. In: DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, vol. 106 (2001)
Tsiounis, Y., Yung, M.: On the security of ElGamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054019
Yakut, I., Polat, H.: Arbitrarily distributed data-based recommendations with privacy. Data Knowl. Eng. 72, 239–256 (2012)
Zhang, F., et al.: Privacy-aware smart city: a case study in collaborative filtering recommender systems. J. Parallel Distrib. Comput. 127, 145–159 (2019)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Appendices
A Similarity Computation
Cosine similarity is used here to show the similarity between two items. It computes similarity between rating vectors of two items using cosine of angle between the vectors, smaller angle represents more similarity.

Algorithm 3 shows the similarity computation phase. Before executing these phases, the users would have been divided into groups and generated group keys for respective groups. The common key Y is available to all users. The server has computed the average rating of all items.
The similarity between two items \(\theta \) and \(\theta '\) is computed as:
B CBF-Based Recommendation
To generate recommendations, the server computes predicted ratings for all items and send them to the user. At the user end items with the highest ratings are shown to the user as recommended items list. The server sends predicted ratings encrypted under the target user’s public key so these predictions can be seen by the intended user only. In CBF-Based recommendations, for a user u the rating for item \(\theta \) is computed as:
The user sends its encrypted ratings to the server, and the server computes numerator and denominator values of rating predictions for all items, encrypts them using the target user’s public key and sends back to the user. The user decrypts all predicted ratings and receives the recommendations. Algorithm 4 shows the detailed steps.


C CF-Based Recommendation
To generate recommendations using CF-based technique, the data flow is similar to that of CBF-based technique with following equation for prediction:
Detailed steps are shown in Algorithm 5.
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Verma, P., Mathuria, A., Dasgupta, S. (2019). Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. In: Garg, D., Kumar, N., Shyamasundar, R. (eds) Information Systems Security. ICISS 2019. Lecture Notes in Computer Science(), vol 11952. Springer, Cham. https://doi.org/10.1007/978-3-030-36945-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-36945-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36944-6
Online ISBN: 978-3-030-36945-3
eBook Packages: Computer ScienceComputer Science (R0)