Adding Privacy to Netflix Recommendations Frank McSherry, Ilya Mironov (MSR SVC) Attacks on Recommender Systems — No “blending in”, auxiliary information.

Slides:



Advertisements
Similar presentations
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Advertisements

Online Recommendations
Differentially Private Recommendation Systems Jeremiah Blocki Fall A: Foundations of Security and Privacy.
Jeff Howbert Introduction to Machine Learning Winter Collaborative Filtering Nearest Neighbor Approach.
1/03/09 De 89 à 98. 1/03/09 De 89 à 98 1/03/09 De 89 à 98.
Person Re-Identification Application for Android
Privacy Enhancing Technologies
Seminar in Foundations of Privacy 1.Adding Consistency to Differential Privacy 2.Attacks on Anonymized Social Networks Inbal Talgam March 2008.
Collaborative Filtering in iCAMP Max Welling Professor of Computer Science & Statistics.
Rubi’s Motivation for CF  Find a PhD problem  Find “real life” PhD problem  Find an interesting PhD problem  Make Money!
Turning Privacy Leaks into Floods: Surreptitious Discovery of Social Network Friendships Michael T. Goodrich Univ. of California, Irvine joint w/ Arthur.
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
Frank McSherry Researcher Microsoft Research, Silicon Valley.
Malicious parties may employ (a) structure-based or (b) label-based attacks to re-identify users and thus learn sensitive information about their rating.
April 13, 2010 Towards Publishing Recommendation Data With Predictive Anonymization Chih-Cheng Chang †, Brian Thompson †, Hui Wang ‡, Danfeng Yao † †‡
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.
Database Access Control & Privacy: Is There A Common Ground? Surajit Chaudhuri, Raghav Kaushik and Ravi Ramamurthy Microsoft Research.
Multiplicative Weights Algorithms CompSci Instructor: Ashwin Machanavajjhala 1Lecture 13 : Fall 12.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Enkh-Amgalan Baatarjav Jedsada Chartree Thiraphat Meesumrarn University of North Texas.
Defining and Achieving Differential Privacy Cynthia Dwork, Microsoft TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
By Rachsuda Jiamthapthaksin 10/09/ Edited by Christoph F. Eick.
CS573 Data Privacy and Security Statistical Databases
Privacy risks of collaborative filtering Yuval Madar, June 2012 Based on a paper by J.A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten & V. Shmatikov.
Privacy-Aware Personalization for Mobile Advertising
Recursion. Review  Recursive solutions, by definition, are built off solutions to sub-problems.  Many times, this will mean simply to compute f(n) by.
INTRODUCTION TO RESEARCHERID. Agenda What is ResearcherID? Why do you need ResearcherID? Search ResearcherID Access ResearcherID and create a profile.
Privacy of profile-based ad targeting Alexander Smal and Ilya Mironov.
The Matrix: Using Intermediate Features to Classify and Predict Friends in a Social Network Michael Matczynski Status Report April 14, 2006.
Towards Possible Changes to the Census Recommendations on Families and Households Pierre Turcotte and Viviane Renaud Statistics Canada Presented at the.
RecBench: Benchmarks for Evaluating Performance of Recommender System Architectures Justin Levandoski Michael D. Ekstrand Michael J. Ludwig Ahmed Eldawy.
Personalized Social Recommendations – Accurate or Private? A. Machanavajjhala (Yahoo!), with A. Korolova (Stanford), A. Das Sarma (Google) 1.
SVY 207: Lecture 7 Differential GPS By now you should understand: –How GPS point positioning works from first principles Aim of this lecture: –To understand.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Geo-Indistinguishability: Differential Privacy for Location Based Services Miguel Andres, Nicolas Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi.
Predictive Discrete Latent Factor Models for large incomplete dyadic data Deepak Agarwal, Srujana Merugu, Abhishek Agarwal Y! Research MMDS Workshop, Stanford.
The world’s libraries. Connected. Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy Group Meeting in 2015.
Eurostat’s Business Demography project – progress report 18th Roundtable on Business Survey Frames Session 8 22/10/2004.
Private Release of Graph Statistics using Ladder Functions J.ZHANG, G.CORMODE, M.PROCOPIUC, D.SRIVASTAVA, X.XIAO.
Experimental Study on Item-based P-Tree Collaborative Filtering for Netflix Prize.
Privacy-safe Data Sharing. Why Share Data? Hospitals share data with researchers – Learn about disease causes, promising treatments, correlations between.
Recommender Systems Based Rajaraman and Ullman: Mining Massive Data Sets & Francesco Ricci et al. Recommender Systems Handbook.
Netflix Prize: Predicting Ratings. Data mv_00(movieID).txt: 1: (1-2,649,429) (1-5) Over 17,000 movie txt files Over 400,000 userID Two Gigs zipped.
。 33 投资环境 3 开阔视野 提升竞争力 。 3 嘉峪关市概况 。 3 。 3 嘉峪关是一座新兴的工业旅游城市,因关得名,因企设市,是长城文化与丝路文化交 汇点,是全国唯一一座以长城关隘命名的城市。嘉峪关关城位于祁连山、黑山之间。 1965 年建市,下辖雄关区、镜铁区、长城区, 全市总面积 2935.
Computational Differential Privacy Ilya Mironov (MICROSOFT) Omkant Pandey (UCLA) Omer Reingold (MICROSOFT) Salil Vadhan (HARVARD)
Trust-aware Recommender Systems
Mining User Similarity from Semantic Trajectories
Privacy-Preserving Clustering
Post-Modern Private Data Analysis
Privacy-preserving Release of Statistics: Differential Privacy
Differential Privacy A Primer for the Perplexed
בניית שאלון לתלמיד PROFILES דבורה קצביץ.
Designing Private Forums
مديريت استراتژيك (Strategic Management). مديريت استراتژيك (Strategic Management)
Differential Privacy in Practice
Collaborative Filtering Nearest Neighbor Approach
Q4 : How does Netflix recommend movies?
Differential Privacy and Statistical Inference: A TCS Perspective
Learning the Behavior of Users in a Public Space through Video Tracking Yan, W. and Forsyth, D. "Learning the Behavior of Users in a Public Space through.
Differential Privacy (2)
Movie Recommendation System
Privacy-preserving Prediction
Collaborative Filtering Non-negative Matrix Factorization
Published in: IEEE Transactions on Industrial Informatics
Background Many problems require large scale distributed computing
Updating your Personal Profile
Differential Privacy (1)
Exploiting Unintended Feature Leakage in Collaborative Learning
Differential Privacy.
Presentation transcript:

Adding Privacy to Netflix Recommendations Frank McSherry, Ilya Mironov (MSR SVC) Attacks on Recommender Systems — No “blending in”, auxiliary information — Differencing attacks/active attacks — Potential threats: — re-identification, linking of profiles — business, legal liabilities “Users like you”“Enjoyed by members who enjoyed” C C B A ABC DE F : A D E ? ?

Differential Privacy Strong formal privacy definition. Informally: “Any output of the computation is as likely with your data as without.” Privacy for a Count: How Many Ratings? Current Architectures: DP Private Architecture: Any output is as likely with your data as without.

Netflix Prize Dataset 17K movies 480K people 100M ratings 3M unknowns $1M for beating the benchmark by 10% Differentially Private Recommendation 1.Global effects (movie/user averages) 2.Movie-movie covariance matrix 3.Leading “geometric” Netflix algorithms Accuracy-Privacy Tradeoff DP Cost of Privacy over Time