Skip to main content

2018 | OriginalPaper | Buchkapitel

Data Security in Recommendation System Using Homomorphic Encryption

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is like a daily routine now a day. Even though it has numbers of advantages in technical and business view, still there are some challenges there like data storage security, confidentiality and integrity. Main risk in cloud data is about to trust on cloud owner. Encrypted data is not useful for any computational process, so we cannot store as encrypted data. In recommendation system cloud plays very important role. Using homomorphic encryption, we can perform cloud data analyzation. This paper discusses about different homomorphic encryption technique and solution to recommendation system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Schafer, J.B., Konstan, J., Riedi, J.: Recommender systems in e-commerce. In: Proceedings of the 1st ACM conference on Electronic Commerce, pp. 158–166. ACM Press, New York (1999) Schafer, J.B., Konstan, J., Riedi, J.: Recommender systems in e-commerce. In: Proceedings of the 1st ACM conference on Electronic Commerce, pp. 158–166. ACM Press, New York (1999)
2.
Zurück zum Zitat Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, Florida, USA, pp. 99–106. IEEE, November 2003 Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, Florida, USA, pp. 99–106. IEEE, November 2003
3.
Zurück zum Zitat Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. Society for Industrial Mathematics (2005) Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. Society for Industrial Mathematics (2005)
4.
Zurück zum Zitat Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. In Proceedings of the SIAM Data Mining (SDM 2005), Newport Beach, California, USA, April 2005 Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. In Proceedings of the SIAM Data Mining (SDM 2005), Newport Beach, California, USA, April 2005
5.
Zurück zum Zitat Aggarwal, C.C., Yu, P.S.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms, Chapter 2, pp. 11–52. Springer, New York (2008) Aggarwal, C.C., Yu, P.S.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms, Chapter 2, pp. 11–52. Springer, New York (2008)
6.
Zurück zum Zitat Han, S., Ng, W.K., Yu, P.S.: Privacy-preserving singular value decomposition. In: Proceedings of the 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China, IEEE, March–April 2009 Han, S., Ng, W.K., Yu, P.S.: Privacy-preserving singular value decomposition. In: Proceedings of the 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China, IEEE, March–April 2009
7.
Zurück zum Zitat Basu, A., Kikuchi, H., Vaidya, J.: Privacy-preserving weighted slope one predictor for item-based collaborative filtering. In: Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (TP-DIS 2011), Copenhagen, Denmark, July 2011 Basu, A., Kikuchi, H., Vaidya, J.: Privacy-preserving weighted slope one predictor for item-based collaborative filtering. In: Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (TP-DIS 2011), Copenhagen, Denmark, July 2011
8.
Zurück zum Zitat Zhang, X., Hong tao D.: Ensure data securiy in cloud stoarge. In: NCIS 2011, pp. 284–287 Zhang, X., Hong tao D.: Ensure data securiy in cloud stoarge. In: NCIS 2011, pp. 284–287
9.
Zurück zum Zitat Vaidya, J., Yakut, I., Basu, A.: Efficient integrity verification for outsourced collaborative filtering. In: Data Mining (ICDM), IEEE (2014) Vaidya, J., Yakut, I., Basu, A.: Efficient integrity verification for outsourced collaborative filtering. In: Data Mining (ICDM), IEEE (2014)
10.
Zurück zum Zitat Kangavalli, R., Vagdevi, S.: A mixed homomorphic encryption scheme for secure data storage in cloud, IEEE (2015) Kangavalli, R., Vagdevi, S.: A mixed homomorphic encryption scheme for secure data storage in cloud, IEEE (2015)
11.
Zurück zum Zitat Ganatra, G., Kosta, Y.P., Panchal, G., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011) Ganatra, G., Kosta, Y.P., Panchal, G., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)
12.
Zurück zum Zitat Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), pp. 248–251. Bangalore, India (2010) Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), pp. 248–251. Bangalore, India (2010)
13.
Zurück zum Zitat Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef
14.
Zurück zum Zitat Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of mul-tilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theory Eng. 3(2), 332–337 (2011)CrossRef Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of mul-tilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theory Eng. 3(2), 332–337 (2011)CrossRef
15.
Zurück zum Zitat Panchal, G., Panchal, D.: Solving np hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol 6(2), 1824–1827 (2015) Panchal, G., Panchal, D.: Solving np hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol 6(2), 1824–1827 (2015)
16.
Zurück zum Zitat Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol 6(2), 1828–1831 (2015) Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol 6(2), 1828–1831 (2015)
17.
Zurück zum Zitat Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015) Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015)
18.
Zurück zum Zitat Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015) Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015)
19.
Zurück zum Zitat Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, pp. 1–6. AEEICB (2016) Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, pp. 1–6. AEEICB (2016)
20.
Zurück zum Zitat Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer, New York (2016) Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer, New York (2016)
21.
Zurück zum Zitat Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage, pp. 1–18. Springer (Multimedia Tools and Application), New York (2017) Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage, pp. 1–18. Springer (Multimedia Tools and Application), New York (2017)
22.
Zurück zum Zitat Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009) Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)
23.
Zurück zum Zitat Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017) Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)
24.
Zurück zum Zitat Patel, J., Panchal, G.: An IOT based portable smart meeting space with real-time room occupancy. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Patel, J., Panchal, G.: An IOT based portable smart meeting space with real-time room occupancy. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
25.
Zurück zum Zitat Soni, K., Panchal, G.: Data security in recommendation system using homo-morphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Soni, K., Panchal, G.: Data security in recommendation system using homo-morphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
26.
Zurück zum Zitat Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
27.
Zurück zum Zitat Bhimani, P., Panchal, G.: Message delivery guarantee and status update of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017) Bhimani, P., Panchal, G.: Message delivery guarantee and status update of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)
28.
Zurück zum Zitat Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017) Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)
29.
Zurück zum Zitat Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010) Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)
Metadaten
Titel
Data Security in Recommendation System Using Homomorphic Encryption
verfasst von
Kajol Soni
Gaurang Panchal
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-63673-3_37

Premium Partner