Proceedings of the Third ACM Conference on Recommender Systems 2009
DOI: 10.1145/1639714.1639741
|View full text |Cite
|
Sign up to set email alerts
|

Preserving privacy in collaborative filtering through distributed aggregation of offline profiles

Abstract: In recommender systems, usually, a central server needs to have access to users' profiles in order to generate useful recommendations. Having this access, however, undermines the users' privacy. The more information is revealed to the server on the user-item relations, the lower the users' privacy is. Yet, hiding part of the profiles to increase the privacy comes at the cost of recommendation accuracy or difficulty of implementing the method. In this paper, we propose a distributed mechanism for users to augme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
44
1
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(46 citation statements)
references
References 18 publications
0
44
1
1
Order By: Relevance
“…Alternatively, data modification can be conducted by the users. For example (Shokri, Pedarsani, Theodorakopoulos, & Hubaux, 2009) proposed to augment the user profile with profiles of similar users before sending the data to the centralized server. Thus, users keep their offline profiles and occasionally send it to the server, where the profiles are stored.…”
Section: Related Workmentioning
confidence: 99%
“…Alternatively, data modification can be conducted by the users. For example (Shokri, Pedarsani, Theodorakopoulos, & Hubaux, 2009) proposed to augment the user profile with profiles of similar users before sending the data to the centralized server. Thus, users keep their offline profiles and occasionally send it to the server, where the profiles are stored.…”
Section: Related Workmentioning
confidence: 99%
“…This is analogous to earlier work addressing queries on census data but, at that time, relatively few prospective attackers [2,7]. There has been some initial work towards retaining privacy while still benefiting from recommendation systems (e.g., [9,41]). There have also been other approaches such as k-anonymity [43], differential privacy [12], and applications of differential privacy to other domains [34,37].…”
Section: Privacymentioning
confidence: 66%
“…The data-obfuscation solutions (e.g. [24], [27], [37]) rely on adding noise to the original data or computation results to protect users' inputs. These solutions usually do not incur complicated manipulations on the users' inputs, so that they are much more efficient.…”
Section: A Related Workmentioning
confidence: 99%