期刊文献+

基于分布式数据的隐私保持协同过滤推荐研究 被引量:17

Research on Privacy-Preserving Collaborative Filtering Recommendation Based on Distributed Data
在线阅读 下载PDF
导出
摘要 针对分布式数据存储结构的协同过滤推荐隐私保持问题,以可交换的密码系统为主要技术,设计了一个协议,集中解决其核心任务——在保持用户隐私前提下对项目评分.准确度与数据集中存放一样,但能保持各分站点下用户评分数据的隐私.基于安全多方计算理论和随机预言模型,证明了协议的安全性,分析了协议的时间复杂度和通信耗费. Privacy-preserving data mining is a cutting-edge research direction in recent years. As one of its sub-directions, privacy-preserving collaborative filtering aims at protecting users' privacy while providing high-quality recommendations efficiently. To reserve privacy in collaborative filtering recommender systems under distributed data scenario, the core challenge how to securely rate a specific item is addressed. A protocol employing commutative encryption as its major privacy-preserving technique is introduced. traditional memory-based collaborative filtering re ratings from being known by other sites rather tha tation and random oracle model, the protocol's s complexity and communication costs are analyzed This protocol produces the same results as the traditional memory-based collaborative filtering recommender systems while preventing any user ratings from being known by other sites rather than by itself. Based on secure multi-party computation and random oracle model,the protocol's security is proved. The protocol's computation as well.
作者 张锋 常会友
出处 《计算机学报》 EI CSCD 北大核心 2006年第8期1487-1495,共9页 Chinese Journal of Computers
基金 国家自然科学基金(60573159) 广东省自然科学基金重点项目基金(05100302)资助.
关键词 推荐系统 协同过滤 隐私保持 安全多方计算 随机预言模型 recommender system collaborative filtering privacy preserving secure multi-partycomputation random oracle model
  • 相关文献

参考文献23

  • 1Sarwar B. , Karypis G. , Konstan J. , Riedl J.. Analysis of recommendation algorithms for E-Commerce. In: Proceedings of the 2nd ACM Conference on Electronic Commerce, Minneapolis, MN, USA, 2000, 158-167
  • 2Chee S. H. S. , Han J. W., Wang K.. RecTree: An efficient collaborative filtering method. In: Proceedings of the 3rd International Conference on Data Warehousing and Knowledge Discovery, Munich, Germany, 2001, 141-151
  • 3Kantarcioglu M. , Clifton C.. Privacy-preserving distributed mining of association rules on horizontally partitioned data.IEEE Transactions on Knowledge and Data Engineering, 2004,16(9): 1026-1037
  • 4Vaidya J. , Clifton C.. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 2005, 13(4): 593-622
  • 5Agrawal R. , Srikant R.. Privacy-preserving data mining. In:Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, Dallas, Texas, USA, 2000, 439-450
  • 6Vaidya J. , Clifton C.. Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, D. C. , USA, 2003, 206-215
  • 7Vaidya J. , Clifton C.. Privacy-preserving outlier detection.In: Proceedings of the 4th IEEE International Conference on Data Mining, Brighton, UK, 2004, 233-240
  • 8Wright R. , Yang Z.. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In:Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, 2004, 713-718
  • 9Canny J.. Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2002, 45-57
  • 10Canny J.. Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Tampere, Finland, 2002, 238-245

二级参考文献26

  • 1Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. htttp://theory.lcs.mit.edu/-oded
  • 2Cramer R. Introduction to secure computation. In: Damgaard I, ed. Lectures on Data Security-Modern Cryptology in Theory and Practice. Lecture Notes in Computer Science, Vol 1561. Springer-Verlag, 1999. 16-62.
  • 3Yao AC. Protocols for secure computation. In: Proc. of the 23rd IEEE Symp. on Foundation of Computer Science. Chicago: IEEE Computer Society, 1982. 160-164.
  • 4Cachin C. Efficient private bidding and auctions with an oblivious third party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery, 1999.120~127.
  • 5Fagin R, Naor M, Winkler P. Comparing information without leaking it. Communications of the ACM, 1996,39(5):77-85.
  • 6Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed., John Wiley & Sons, Inc., 1996.
  • 7Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Slern J, ed.Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vo1.1592, Springer-Verlag, 1999.402~414.
  • 8Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In: Association for Computing Machinery, ed. Proc.of the 5th ACM Conf. on Computer and Communications Security. San Francisco: ACM, 1998.59~66.
  • 9Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring. In: Nyberg K, ed. Proc. of the Advances in Cryptology-EUROCRYPT'98. Lecture Notes in Computer Science, Vol 1403, Springer-Verlag, 1998. 308~318.
  • 10Paillier P. Public-Key cryptosystem based on composite degree residuosity classes. In: Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vol 1592, Springer-Verlag, 1999. 223~238.

共引文献78

同被引文献238

引证文献17

二级引证文献393

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部