Skip to main content

2019 | OriginalPaper | Buchkapitel

Adopting Non-linear Programming to Select Optimum Privacy Parameters for Multi-parameters Perturbation Algorithm for Data Privacy Improvement in Recommender Systems

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recommendation system has witnessed a significant improvement with the introduction of data mining. Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. In order to preserve the privacy of the client in data mining process, the issue of information protection has become more urgently demanded. In this paper, an innovative system for movies recommendation is proposed. The new proposed system is fundamentally based on modified version of multi-parameters perturbation and query restriction as well as adopting non-linear programming strategy to select optimum privacy parameters. The results showed that the proposed framework is capable of providing the maximum security for the information available without decreasing the accuracy of recommendation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of ICDM, pp. 589–592 (2005) Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of ICDM, pp. 589–592 (2005)
2.
Zurück zum Zitat Jeckmans, A.J.P., Beye, M., Zekeriya, E., Pieter, H., Reginald, L.L., Quiang, T.: Privacy in recommender systems. In: Ramzan, N., van Zwol, R., Lee, J.S., Clüver, K., Hua, X.S. (eds.) Social Media Retrieval. Springer, London (2013) Jeckmans, A.J.P., Beye, M., Zekeriya, E., Pieter, H., Reginald, L.L., Quiang, T.: Privacy in recommender systems. In: Ramzan, N., van Zwol, R., Lee, J.S., Clüver, K., Hua, X.S. (eds.) Social Media Retrieval. Springer, London (2013)
3.
Zurück zum Zitat Liu, K., Kargupta, H., Ryan, J.: Random projection –based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18, 92–106 (2006)CrossRef Liu, K., Kargupta, H., Ryan, J.: Random projection –based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18, 92–106 (2006)CrossRef
4.
Zurück zum Zitat Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the SIAM International Conference on Data Mining, April 2007 Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the SIAM International Conference on Data Mining, April 2007
5.
Zurück zum Zitat Li, T., Li, N.: Towards optimal k-anonymization. Data Knowl. Eng. 303. (2008) Li, T., Li, N.: Towards optimal k-anonymization. Data Knowl. Eng. 303. (2008)
6.
Zurück zum Zitat Majid, B.M., Asger Gahzi, M., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: IEEE Third International Conference on Computer and Communication Technology (2012) Majid, B.M., Asger Gahzi, M., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: IEEE Third International Conference on Computer and Communication Technology (2012)
7.
Zurück zum Zitat Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of data (2000) Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of data (2000)
8.
Zurück zum Zitat Liu, L., Kantarcioglu, M., Thuraisingham, B.: The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65, 5–21 (2008)CrossRef Liu, L., Kantarcioglu, M., Thuraisingham, B.: The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65, 5–21 (2008)CrossRef
9.
Zurück zum Zitat Shah, A., Gulati, R.: Privacy preserving data mining: techniques, classification and implications - a survey. Int. J. Comput. Appl. (0975 – 8887) 137(12), 40–46 (2016) Shah, A., Gulati, R.: Privacy preserving data mining: techniques, classification and implications - a survey. Int. J. Comput. Appl. (0975 – 8887) 137(12), 40–46 (2016)
10.
Zurück zum Zitat Jagannathan, G., Wright, R.N.: Privacy-preserving imputation of missing data. Data Knowl. Eng. (2008) Jagannathan, G., Wright, R.N.: Privacy-preserving imputation of missing data. Data Knowl. Eng. (2008)
11.
Zurück zum Zitat Yang, W., Qiao, S.: A novel anonymization algorithm: Privacy protection and knowledge preservation. Expert Syst. Appl. 37, 756–766 (2007)CrossRef Yang, W., Qiao, S.: A novel anonymization algorithm: Privacy protection and knowledge preservation. Expert Syst. Appl. 37, 756–766 (2007)CrossRef
12.
Zurück zum Zitat Mukkamala, R., Ashok, V.G: Fuzzy-based methods for privacy-preserving data mining. In: Eighth International Conference on Information Technology: New Generations (ITNG), pp. 348–353 (2011) Mukkamala, R., Ashok, V.G: Fuzzy-based methods for privacy-preserving data mining. In: Eighth International Conference on Information Technology: New Generations (ITNG), pp. 348–353 (2011)
13.
Zurück zum Zitat Poovammal, E., Ponnavaikko, M.: An improved method for privacy preserving data mining. In: IEEE International Advance Computing Conference (IACC) Patiala, India, 6–7 March 2009 Poovammal, E., Ponnavaikko, M.: An improved method for privacy preserving data mining. In: IEEE International Advance Computing Conference (IACC) Patiala, India, 6–7 March 2009
14.
Zurück zum Zitat Kamal, R., Hussein, W., Ismail, R.: Privacy preserving recommender system based on improved MASK and query restriction. In: IEEE Eighth International Conference on Intelligent Computing and Information Systems (ICICIS) (2017) Kamal, R., Hussein, W., Ismail, R.: Privacy preserving recommender system based on improved MASK and query restriction. In: IEEE Eighth International Conference on Intelligent Computing and Information Systems (ICICIS) (2017)
15.
Zurück zum Zitat Lou, H., Ma, Y., Zhang, F., Liu, M., Shen, W.: Data mining for privacy preserving association rules based on improved MASK algorithm. In: Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design (2014) Lou, H., Ma, Y., Zhang, F., Liu, M., Shen, W.: Data mining for privacy preserving association rules based on improved MASK algorithm. In: Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design (2014)
16.
Zurück zum Zitat Xie, Y., Wulamu, A., Hu, X.: Design and implementation of privacy-preserving recommendation system based on MASK. J. Softw. 9(10), 2607–2613 (2014)CrossRef Xie, Y., Wulamu, A., Hu, X.: Design and implementation of privacy-preserving recommendation system based on MASK. J. Softw. 9(10), 2607–2613 (2014)CrossRef
Metadaten
Titel
Adopting Non-linear Programming to Select Optimum Privacy Parameters for Multi-parameters Perturbation Algorithm for Data Privacy Improvement in Recommender Systems
verfasst von
Reham Kamal
Wedad Hussein
Rasha Ismail
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-99010-1_55