2010 24th IEEE International Conference on Advanced Information Networking and Applications 2010
DOI: 10.1109/aina.2010.159
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Berkvosky et al [41] also propose the use of a peer-to-peer decentralised scheme to perform PPCF. In this case, each user has its own rating vector and there is no need for a central server or trust party.…”
Section: B Decentralised Ppcf Methodsmentioning
confidence: 98%
“…Berkvosky et al [41] also propose the use of a peer-to-peer decentralised scheme to perform PPCF. In this case, each user has its own rating vector and there is no need for a central server or trust party.…”
Section: B Decentralised Ppcf Methodsmentioning
confidence: 98%
“…Privacy-preserving collaborative filtering methods can be used to protect user privacy. Different protection methods can be found in the literature (Boutet, A., Frey, D., Guerraoui, R., Jégou, A., & Kermarrec, 2016;Polatidis, Georgiadis, Pimenidis, & Mouratidis, 2017;Songjie Gong, 2011;Tada, Kikuchi, & Puntheeranurak, 2010;Yakut & Polat, 2012). These methods add a level of noise to the data, thus providing a level of protection which comes with a decrease in terms of the quality of the top-N recommendations.…”
Section: How Can User Privacy Be Protected When Collaborative Filterimentioning
confidence: 99%
“…Another method is a homomorphicbased solution by which authors used the Paillier cryptosystem to secure user privacy in user-based CF algorithm [12]. The last one is also based on Paillier cryptosystem by same authors where [12] was improved in-terms of computation and communication costs by introducing privacypreserving item-based CF algorithm [13]. Figure 6 shows the comparison with [12,17] and [13] in-terms of total computation time required to perform average, similarity calculation and recommendation generation (we consider only one type of recommendation; for instance, CF-based recommendation).…”
Section: Computation and Communication Costsmentioning
confidence: 99%
“…The last one is also based on Paillier cryptosystem by same authors where [12] was improved in-terms of computation and communication costs by introducing privacypreserving item-based CF algorithm [13]. Figure 6 shows the comparison with [12,17] and [13] in-terms of total computation time required to perform average, similarity calculation and recommendation generation (we consider only one type of recommendation; for instance, CF-based recommendation). Note that, Kikuchi et al [12] and Tada et al [13] introduced public key-based cryptographic protocol and [17] represented non-cryptographic-based solutions to generate recommendations.…”
Section: Computation and Communication Costsmentioning
confidence: 99%
See 1 more Smart Citation