1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.

Slides:



Advertisements
Similar presentations
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Advertisements

Differentially Private Recommendation Systems Jeremiah Blocki Fall A: Foundations of Security and Privacy.
Private Analysis of Graph Structure With Vishesh Karwa, Sofya Raskhodnikova and Adam Smith Pennsylvania State University Grigory Yaroslavtsev
Jeff Howbert Introduction to Machine Learning Winter Collaborative Filtering Nearest Neighbor Approach.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
1 RegionKNN: A Scalable Hybrid Collaborative Filtering Algorithm for Personalized Web Service Recommendation Xi Chen, Xudong Liu, Zicheng Huang, and Hailong.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Agenda  Introduction and background  Attacks: dimension and Classification  Attack Types  Effectiveness analysis  Countermeasures 
Structural Data De-anonymization: Quantification, Practice, and Implications Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
6/2/ An Automatic Personalized Context- Aware Event Notification System for Mobile Users George Lee User Context-based Service Control Group Network.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Item-based Collaborative Filtering Idea: a user is likely to have the same opinion for similar items [if I like Canon cameras, I might also like Canon.
Rubi’s Motivation for CF  Find a PhD problem  Find “real life” PhD problem  Find an interesting PhD problem  Make Money!
Memory-Based Recommender Systems : A Comparative Study Aaron John Mani Srinivasan Ramani CSCI 572 PROJECT RECOMPARATOR.
Lecture 14: Collaborative Filtering Based on Breese, J., Heckerman, D., and Kadie, C. (1998). Empirical analysis of predictive algorithms for collaborative.
Learning Bit by Bit Collaborative Filtering/Recommendation Systems.
Recommendations via Collaborative Filtering. Recommendations Relevant for movies, restaurants, hotels…. Recommendation Systems is a very hot topic in.
Collaborative filtering with privacy Wim Verhaegh Aukje van Duijnhoven Jan Korst Pim Tuyls IPA herfstdagen, 23 November 2004.
Malicious parties may employ (a) structure-based or (b) label-based attacks to re-identify users and thus learn sensitive information about their rating.
April 13, 2010 Towards Publishing Recommendation Data With Predictive Anonymization Chih-Cheng Chang †, Brian Thompson †, Hui Wang ‡, Danfeng Yao † †‡
1 Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques Huseyin Polat and Wenliang (Kevin) Du Department of EECS Syracuse.
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Combining Content-based and Collaborative Filtering Department of Computer Science and Engineering, Slovak University of Technology
Item-based Collaborative Filtering Recommendation Algorithms
Game Theory and Privacy Preservation in Recommendation Systems Iordanis Koutsopoulos U of Thessaly Thalis project CROWN Kick-off Meeting Volos, May 11,
Private Analysis of Graphs
Mark Levene, An Introduction to Search Engines and Web Navigation © Pearson Education Limited 2005 Slide 9.1 Chapter 9 : Social Networks What is a social.
Distributed Networks & Systems Lab. Introduction Collaborative filtering Characteristics and challenges Memory-based CF Model-based CF Hybrid CF Recent.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Using Identity Credential Usage Logs to Detect Anomalous Service Accesses Daisuke Mashima Dr. Mustaque Ahamad College of Computing Georgia Institute of.
Classical Music for Rock Fans?: Novel Recommendations for Expanding User Interests Makoto Nakatsuji, Yasuhiro Fujiwara, Akimichi Tanaka, Toshio Uchiyama,
Thwarting Passive Privacy Attacks in Collaborative Filtering Rui Chen Min Xie Laks V.S. Lakshmanan HKBU, Hong Kong UBC, Canada UBC, Canada Introduction.
Protecting Sensitive Labels in Social Network Data Anonymization.
1 presentation of article: Small-World File-Sharing Communities Article: Adriana Iamnitchi, Matei Ripeanu, Ian Foster Presentation: Periklis Akritidis.
Google News Personalization: Scalable Online Collaborative Filtering
A Graph-based Friend Recommendation System Using Genetic Algorithm
RecBench: Benchmarks for Evaluating Performance of Recommender System Architectures Justin Levandoski Michael D. Ekstrand Michael J. Ludwig Ahmed Eldawy.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Collaborative Data Analysis and Multi-Agent Systems Robert W. Thomas CSCE APR 2013.
Intelligent Database Systems Lab Presenter : JIAN-REN CHEN Authors : Cihan Kaleli, Huseyin Polat 2012, KBS Privacy-preserving SOM-based recommendations.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
RecStore An Extensible and Adaptive Framework for Online Recommender Queries inside the Database Engine.
Temporal Diversity in Recommender Systems Neal Lathia, Stephen Hailes, Licia Capra, and Xavier Amatriain SIGIR 2010 April 6, 2011 Hyunwoo Kim.
A Content-Based Approach to Collaborative Filtering Brandon Douthit-Wood CS 470 – Final Presentation.
Evaluation of Recommender Systems Joonseok Lee Georgia Institute of Technology 2011/04/12 1.
EigenRank: A ranking oriented approach to collaborative filtering By Nathan N. Liu and Qiang Yang Presented by Zachary 1.
1 Privacy-Enhanced Collaborative Filtering Privacy-Enhanced Personalization workshop July 25, 2005, Edinburgh, Scotland Shlomo Berkovsky 1, Yaniv Eytani.
Similarity & Recommendation Arjen P. de Vries CWI Scientific Meeting September 27th 2013.
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
Evaluation of gene-expression clustering via mutual information distance measure Ido Priness, Oded Maimon and Irad Ben-Gal BMC Bioinformatics, 2007.
Community-Based Link Prediction/Recommendation in the Bipartite Network of BoardGameGeek.com Brett Boge CS 765 University of Nevada, Reno.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Item-Based Collaborative Filtering Recommendation Algorithms Badrul Sarwar, George Karypis, Joseph Konstan, and John Riedl GroupLens Research Group/ Army.
Reputation-aware QoS Value Prediction of Web Services Weiwei Qiu, Zhejiang University Zibin Zheng, The Chinese University of HongKong Xinyu Wang, Zhejiang.
Collaborative Filtering With Decoupled Models for Preferences and Ratings Rong Jin 1, Luo Si 1, ChengXiang Zhai 2 and Jamie Callan 1 Language Technology.
Privacy Issues in Graph Data Publishing Summer intern: Qing Zhang (from NC State University) Mentors: Graham Cormode and Divesh Srivastava.
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Collaborative Filtering Nearest Neighbor Approach
M.Sc. Project Doron Harlev Supervisor: Dr. Dana Ron
Movie Recommendation System
ITEM BASED COLLABORATIVE FILTERING RECOMMENDATION ALGORITHEMS
Privacy Protection for Social Network Services
Exploring Latent Features for Memory-Based QoS Prediction in Cloud Computing Yilei Zhang 17/05/2011.
Published in: IEEE Transactions on Industrial Informatics
A Unified Framework for Location Privacy
Presentation transcript:

1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New York City, NY, USA, October 22-25, Reza Shokri Pedram Pedarsani George Theodorakopoulos Jean-Pierre Hubaux

2 Privacy in Recommender Systems Untrusted Server –Tracking users’ activities Publishing Users’ Profiles –Re-identification attacks on anonymous datasets A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy, 2008.

3 Problem Statement Improving users privacy with minimum imposition of accuracy loss on the recommendations –Centralized recommender system –Contact between users –Distributed privacy preserving mechanism Distributed aggregation of users’ profiles –Users hide the items they have actually rated through adding items rated by other users to their profile Proposed Solution

4 Outline Profile Aggregation Aggregation Methods Evaluation

5 Profile Aggregation items ratings Each user gives a subset of his items to his contact peer Thus, users profiles are aggregated after the contact AliceBob

6 System Model Online profile Offline profile synchronization Actual Profile: Set of items rated by a user Offline Profile: Actual profile + aggregated items Online Profile: The latest synchronized offline profile on the server contact

7 Online Profiles vs. Actual Profiles … … Online profile of users … … Actual profile of users

8 Aggregation Methods How many items to aggregate? Which items to aggregate? Similarity-based Aggregation (Similarity: The Pearson’s correlation coefficient) –Random Selection (SRS) –Minimum Rating Frequency (SMRF) (rating frequency: percentage of users that have rated an item) IMDB: 167,237 votes IMDB: 1,625 votes

9 Evaluation Metrics Privacy Gain Accuracy Loss

10 Privacy Gain number of users actual profile of user ‘u’ online profile of user ‘u’ rating frequency of item ‘i’ R. Myers, R. C. Wilson, and E. R. Hancock. Bayesian graph edit distance. IEEE Trans. Pattern Anal. Mach. Intell., 22(6), Intuition: Structural difference of two graphs (online and actual) viewed as difference between correspondent edges Privacy : How difficult is for the server to guess the users’ actual profiles, having access to their online profiles Weight of items added by aggregation Weight of items in online profile

11 Accuracy Loss The bipartite graph that contains actual ratings The bipartite graph available to the server

12 Experiment Simulation on randomly chosen profiles –From the Netflix prize dataset –300 users –Average: ratings and 2500 items in each experiment Memory-based CF: user-based Testing set: 10% of the actual ratings of each user Users select their contact peers at random Aggregation methods –Union –SRS –SMRF

13 Privacy Gain Similarity-based Random Selection (SRS) Similarity-based Minimum Rating Frequency (SMRF)

14 Accuracy Loss Similarity-based Random Selection (SRS) Similarity-based Minimum Rating Frequency (SMRF)

15 Tradeoff between Privacy and Accuracy

16 Conclusion A novel method for privacy preservation in collaborative filtering recommendation systems Protection of users privacy against an untrusted server Considerably improving users privacy with minimum effect on recommendations accuracy by aggregating users’ profiles based on their similarities Proposed method can also be used on protecting privacy of users in published datasets

17 Future Work The evaluation of the mechanism can be improved by considering more realistic contact pattern between users, e.g., users friendship in a social network, or physical vicinity We would like to evaluate the practical implication of the method on the maintenance of the profiles