Inicio  /  Applied Sciences  /  Vol: 13 Par: 7 (2023)  /  Artículo
ARTÍCULO
TITULO

Personalized Privacy Protection-Preserving Collaborative Filtering Algorithm for Recommendation Systems

Bin Cheng    
Ping Chen    
Xin Zhang    
Keyu Fang    
Xiaoli Qin and Wei Liu    

Resumen

With the rapid development of ubiquitous data collection and data analysis, data privacy in a recommended system is facing more and more challenges. Differential privacy technology can provide strict privacy protection while reducing the risk of privacy leakage, but it also introduces unwanted noise, which makes the performance of the recommender system worsen. Among different users, the degree of their sensitivity to privacy is usually different. Thus, through considering the impact of users? personalized requirements, the collaborative filtering algorithm can be designed to reduce the amount of unwanted noise. Taking the above assertions into account, we propose a collaborative filtering algorithm based on personalized privacy protection. First, it locally classifies ratings by privacy sensitivity on the user side, then utilizes the random flip mechanism to protect the privacy-sensitive ratings. Then, after the server catches the perturbed rating data, we reconstruct the joint item-item distribution through the Bayesian estimation method. Experimental results show that our proposed algorithm can significantly improve the recommendation performance of recommendation systems while protecting users? privacy.

 Artículos similares

       
 
Mashael M. Alsulami and Arwa Yousef Al-Aama    
The high volume of user-generated content caused by the popular use of online social network services exposes users to different kinds of content that can be harmful or unwanted. Solutions to protect user privacy from such unwanted content cannot be gene... ver más
Revista: Computers

 
Maryam Mehrnezhad and Ehsan Toreini    
Mobile sensors have already proven to be helpful in different aspects of people?s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While th... ver más
Revista: Informatics

 
Muhammad Asif,John Krogstie     Pág. pp. 4 - 9
In most personalized mobile services, the user model remains invisible, and users do not have control over it. Externalization of user models can allow users to get an overview the user model that is used for personalization, and adjust the profile and p... ver más