2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018
DOI: 10.1109/dsn.2018.00055
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!

Abstract: Abstract-Recommendation systems help users identify interesting content, but they also open new privacy threats. In this paper, we deeply analyze the effect of a Sybil attack that tries to infer information on users from a user-based collaborativefiltering recommendation systems. We discuss the impact of different similarity metrics used to identity users with similar tastes in the trade-off between recommendation quality and privacy. Finally, we propose and evaluate a novel similarity metric that combines the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 45 publications
0
1
0
Order By: Relevance
“…Then, t-closeness [22] is a further extension of l-diversity. Instead of just guaranteeing a good representation of sensitive values, this approach enforces that the distribution of every sensitive attribute inside anonymity groups must be the same than the distribution of this attribute in the whole dataset, modulo a threshold t. b) Privacy in P2P: Several works have studied privacy in P2P systems, including privacy-preserving collaborative filtering [28], [29], accountability verifications [30], publishsubscribe systems [7], [31], or content-based routing with Intel SGX [32]. In the context of collaborative filtering, [17] shows how nodes can maintain an obfuscated profile of their interests, and exchange their profiles to route messages to the nodes that are willing to receive them.…”
Section: Related Workmentioning
confidence: 99%
“…Then, t-closeness [22] is a further extension of l-diversity. Instead of just guaranteeing a good representation of sensitive values, this approach enforces that the distribution of every sensitive attribute inside anonymity groups must be the same than the distribution of this attribute in the whole dataset, modulo a threshold t. b) Privacy in P2P: Several works have studied privacy in P2P systems, including privacy-preserving collaborative filtering [28], [29], accountability verifications [30], publishsubscribe systems [7], [31], or content-based routing with Intel SGX [32]. In the context of collaborative filtering, [17] shows how nodes can maintain an obfuscated profile of their interests, and exchange their profiles to route messages to the nodes that are willing to receive them.…”
Section: Related Workmentioning
confidence: 99%