Skip to main content
Top
Published in: Soft Computing 15/2020

12-12-2019 | Methodologies and Application

Feature selection by using privacy-preserving of recommendation systems based on collaborative filtering and mutual trust in social networks

Authors: Somayeh Moghaddam Zadeh Kashani, Javad Hamidzadeh

Published in: Soft Computing | Issue 15/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Given the increasing growth of the Web and consequently the growth of e-commerce, the amount of data which users face are increasing day by day. Therefore, one of the key issues in today’s world is the extraction of knowledge from a large database. The recommendation systems are able to extract useful information from large databases. The information extracted by the recommendation systems may breach the privacy-preserving of individuals and increase the error rate. Concerns will grow along with the increasing privacy breaches, which are done by recommendation systems. In recent years, researchers have provided a variety of techniques for privacy-preserving and reduced error rates in recommendation systems. But most of these methods have not offered good solutions for privacy-preserving issues and reducing error rates. The aim of the proposed method is to provide a solution for users’ security concerns in common filtering systems with reduced error rates and more privacy preservation. In this article, we propose a privacy-preserving method for recommendation systems called PRS, which first uses an anonymous method to convert secondary data without user identification information. The existing trust data are measured in terms of resemblance and trust-weighted criterion and then converted from perturbation-based chaos to confidential data. Finally, these two algorithms have been used for clustering the data: fuzzy c-ordered means and particle swarm optimization. The results of experiments have been compared with state-of-the-art methods, which show the superiority of the proposed method in terms of classification error rates and privacy-preserving.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alatas B, Akin E, Ozer AB (2009) Chaos embedded particle swarm optimization algorithms. Chaos, Solitons Fractals 40(4):1715–1734MathSciNetMATH Alatas B, Akin E, Ozer AB (2009) Chaos embedded particle swarm optimization algorithms. Chaos, Solitons Fractals 40(4):1715–1734MathSciNetMATH
go back to reference Alligood KT, Sauer TD, Yorke JA Chaos (1996) Springer, New York, pp 105–147 Alligood KT, Sauer TD, Yorke JA Chaos (1996) Springer, New York, pp 105–147
go back to reference Amini S, Homayouni S, Safari A et al (2018) Object-based classification of hyperspectral data using Random Forest algorithm. Geo Spatial Inf Sci 21(2):127–138 Amini S, Homayouni S, Safari A et al (2018) Object-based classification of hyperspectral data using Random Forest algorithm. Geo Spatial Inf Sci 21(2):127–138
go back to reference Banati H, Mehta M, Bajaj M (2014) Social behaviour based metrics to enhance collaborative filtering. Int J Comput Inf Syst Ind Manage Appl 6:217–226 Banati H, Mehta M, Bajaj M (2014) Social behaviour based metrics to enhance collaborative filtering. Int J Comput Inf Syst Ind Manage Appl 6:217–226
go back to reference Bertino E, Fovino IN, Provenza LP (2005) A framework for evaluating privacy preserving data mining algorithms. Data Min Knowl Discov 11(2):121–154MathSciNet Bertino E, Fovino IN, Provenza LP (2005) A framework for evaluating privacy preserving data mining algorithms. Data Min Knowl Discov 11(2):121–154MathSciNet
go back to reference Bilge A, Polat H (2013) A scalable privacy-preserving recommendation scheme via bisecting k-means clustering. Inf Process Manage 49(4):912–927 Bilge A, Polat H (2013) A scalable privacy-preserving recommendation scheme via bisecting k-means clustering. Inf Process Manage 49(4):912–927
go back to reference Bobadilla J et al (2013) Recommender systems survey. Knowl Based Syst 46:109–132 Bobadilla J et al (2013) Recommender systems survey. Knowl Based Syst 46:109–132
go back to reference Canny J (2002) Collaborative filtering with privacy. In: 2002 IEEE symposium on security and privacy, 2002. Proceedings. IEEE Canny J (2002) Collaborative filtering with privacy. In: 2002 IEEE symposium on security and privacy, 2002. Proceedings. IEEE
go back to reference Cao J et al (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748 Cao J et al (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748
go back to reference Casino F et al (2015) A k-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011 Casino F et al (2015) A k-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011
go back to reference Chakraborty P, Karforma S (2013) Detection of Profile-injection attacks in recommender systems using outlier analysis. Procedia Technol 10:963–969 Chakraborty P, Karforma S (2013) Detection of Profile-injection attacks in recommender systems using outlier analysis. Procedia Technol 10:963–969
go back to reference Chang Z, Cao J, Zhang Y (2018) A novel image segmentation approach for wood plate surface defect classification through convex optimization. J For Res 29(6):1789–1795 Chang Z, Cao J, Zhang Y (2018) A novel image segmentation approach for wood plate surface defect classification through convex optimization. J For Res 29(6):1789–1795
go back to reference Chen S, Lu R, Zhang J (2017) A flexible privacy-preserving framework for singular value decomposition under internet of things environment. IFIP International conference on trust management. Springer, Cham Chen S, Lu R, Zhang J (2017) A flexible privacy-preserving framework for singular value decomposition under internet of things environment. IFIP International conference on trust management. Springer, Cham
go back to reference Chiou S-Y (2017) A trustworthy online recommendation system based on social connections in a privacy-preserving manner. Multimed Tools Appl 76(7):9319–9336 Chiou S-Y (2017) A trustworthy online recommendation system based on social connections in a privacy-preserving manner. Multimed Tools Appl 76(7):9319–9336
go back to reference Dou K, Guo B, Kuang L (2019) A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection. Multimed Tools Appl 78:26907–26926 Dou K, Guo B, Kuang L (2019) A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection. Multimed Tools Appl 78:26907–26926
go back to reference Dua S, Du X (2016) Data mining and machine learning in cybersecurity. Auerbach Publications, Boca RatonMATH Dua S, Du X (2016) Data mining and machine learning in cybersecurity. Auerbach Publications, Boca RatonMATH
go back to reference Erkin Z et al (2012) Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans Inf Forensics Sec 7(3):1053–1066 Erkin Z et al (2012) Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans Inf Forensics Sec 7(3):1053–1066
go back to reference Fayyoumi E, Oommen BJ (2010) A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw Pract Exp 40(12):1161–1188 Fayyoumi E, Oommen BJ (2010) A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw Pract Exp 40(12):1161–1188
go back to reference Georgiadis CK et al (2017) A method for privacy-preserving collaborative filtering recommendations. J Univ Comput Sci 23(2):146–166 Georgiadis CK et al (2017) A method for privacy-preserving collaborative filtering recommendations. J Univ Comput Sci 23(2):146–166
go back to reference Golbeck JA (2005) Computing and applying trust in web-based social networks. Diss Golbeck JA (2005) Computing and applying trust in web-based social networks. Diss
go back to reference Gong S (2011) Privacy-preserving collaborative filtering based on randomized perturbation techniques and secure multiparty computation. Int J Adv Comput Technol 3(4):89–99 Gong S (2011) Privacy-preserving collaborative filtering based on randomized perturbation techniques and secure multiparty computation. Int J Adv Comput Technol 3(4):89–99
go back to reference Goyal N, Aggarwal N, Dutta M (2015) A novel way of assigning software bug priority using supervised classification on clustered bugs data. In: Advances in intelligent informatics. Springer, Cham, pp 493–501 Goyal N, Aggarwal N, Dutta M (2015) A novel way of assigning software bug priority using supervised classification on clustered bugs data. In: Advances in intelligent informatics. Springer, Cham, pp 493–501
go back to reference Gunes I et al (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767–799 Gunes I et al (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767–799
go back to reference Guo L, Zhang C, Fang Y (2015) A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans Dependable Secure Comput 12(4):413–427 Guo L, Zhang C, Fang Y (2015) A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans Dependable Secure Comput 12(4):413–427
go back to reference Hamidzadeh J, Namaei N (2019) Belief-based chaotic algorithm for support vector data description. Soft Comput 23:4289–4314MATH Hamidzadeh J, Namaei N (2019) Belief-based chaotic algorithm for support vector data description. Soft Comput 23:4289–4314MATH
go back to reference Hamidzadeh J, Sadeghi R, Namaei N (2017) Weighted support vector data description based on chaotic bat algorithm. Appl Soft Comput 60:540–551 Hamidzadeh J, Sadeghi R, Namaei N (2017) Weighted support vector data description based on chaotic bat algorithm. Appl Soft Comput 60:540–551
go back to reference Heidari S et al (2019) Big data clustering with varied density based on MapReduce. J Big Data 6(1):77 Heidari S et al (2019) Big data clustering with varied density based on MapReduce. J Big Data 6(1):77
go back to reference Huber PJ (2011) Robust statistics. In: International encyclopedia of statistical science. Springer, Berlin, pp 1248–1251 Huber PJ (2011) Robust statistics. In: International encyclopedia of statistical science. Springer, Berlin, pp 1248–1251
go back to reference Izakian H, Abraham A (2011) Fuzzy C-means and fuzzy swarm for fuzzy clustering problem. Expert Syst Appl 38(3):1835–1838 Izakian H, Abraham A (2011) Fuzzy C-means and fuzzy swarm for fuzzy clustering problem. Expert Syst Appl 38(3):1835–1838
go back to reference Jain N, Singh A (2017) A survey on privacy preserving mining various techniques with attacks Jain N, Singh A (2017) A survey on privacy preserving mining various techniques with attacks
go back to reference Jian-min H et al (2008) A complete (alpha, k)-anonymity model for sensitive values individuation preservation. In: 2008 International symposium on electronic commerce and security. IEEE Jian-min H et al (2008) A complete (alpha, k)-anonymity model for sensitive values individuation preservation. In: 2008 International symposium on electronic commerce and security. IEEE
go back to reference Kaur H, Kumar N, Batra S (2018) An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Future Gener Comput Syst 86:297–307 Kaur H, Kumar N, Batra S (2018) An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Future Gener Comput Syst 86:297–307
go back to reference Kennedy J (2011) Particle swarm optimization. In: Encyclopedia of machine learning. Springer, Boston, pp 760–766 Kennedy J (2011) Particle swarm optimization. In: Encyclopedia of machine learning. Springer, Boston, pp 760–766
go back to reference Kikuchi H, Mochizuki A (2013) Privacy-preserving collaborative filtering using randomized response. J Inf Process 21(4):617–623 Kikuchi H, Mochizuki A (2013) Privacy-preserving collaborative filtering using randomized response. J Inf Process 21(4):617–623
go back to reference Lam S, Frankowski D, Riedl J (2006) Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: Emerging trends in information and communication security, pp 14–29 Lam S, Frankowski D, Riedl J (2006) Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: Emerging trends in information and communication security, pp 14–29
go back to reference Li C, Luo Z (2011) A hybrid Item-based recommendation algorithm against segment attack in collaborative filtering systems. In: 2011 International conference on information management, innovation management and industrial engineering (ICIII), vol 2. IEEE Li C, Luo Z (2011) A hybrid Item-based recommendation algorithm against segment attack in collaborative filtering systems. In: 2011 International conference on information management, innovation management and industrial engineering (ICIII), vol 2. IEEE
go back to reference Li D et al (2015) An algorithm for efficient privacy-preserving item-based collaborative filtering. Future Gener Comput Syst 55:311–320 Li D et al (2015) An algorithm for efficient privacy-preserving item-based collaborative filtering. Future Gener Comput Syst 55:311–320
go back to reference Li D et al (2016) An algorithm for efficient privacy-preserving item-based collaborative filtering. Future Gener Comput Syst 55:311–320 Li D et al (2016) An algorithm for efficient privacy-preserving item-based collaborative filtering. Future Gener Comput Syst 55:311–320
go back to reference Li J et al (2017) Enforcing differential privacy for shared collaborative filtering. IEEE Access 5:35–49 Li J et al (2017) Enforcing differential privacy for shared collaborative filtering. IEEE Access 5:35–49
go back to reference Liang R, Wang J (2019) A linguistic intuitionistic cloud decision support model with sentiment analysis for product selection in E-commerce. Int J Fuzzy Syst 21(3):963–977 Liang R, Wang J (2019) A linguistic intuitionistic cloud decision support model with sentiment analysis for product selection in E-commerce. Int J Fuzzy Syst 21(3):963–977
go back to reference Liang W et al (2019) TBRS: a trust based recommendation scheme for vehicular CPS network. Future Gener Comput Syst 92:383–398 Liang W et al (2019) TBRS: a trust based recommendation scheme for vehicular CPS network. Future Gener Comput Syst 92:383–398
go back to reference Liu X et al (2017) When differential privacy meets randomized perturbation: a hybrid approach for privacy-preserving recommender system. In: International conference on database systems for advanced applications. Springer, Cham Liu X et al (2017) When differential privacy meets randomized perturbation: a hybrid approach for privacy-preserving recommender system. In: International conference on database systems for advanced applications. Springer, Cham
go back to reference Long Q, Hu Q (2010) Robust evaluation of binary collaborative recommendation under profile injection attack. In: 2010 IEEE international conference on progress in informatics and computing (PIC), vol 2. IEEE Long Q, Hu Q (2010) Robust evaluation of binary collaborative recommendation under profile injection attack. In: 2010 IEEE international conference on progress in informatics and computing (PIC), vol 2. IEEE
go back to reference Ma X et al (2017) APPLET: a privacy-preserving framework for location-aware recommender system. Sci China Inf Sci 60(9):092101 Ma X et al (2017) APPLET: a privacy-preserving framework for location-aware recommender system. Sci China Inf Sci 60(9):092101
go back to reference Ma X et al (2018) ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Gener Comput Syst 79:82–94 Ma X et al (2018) ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Gener Comput Syst 79:82–94
go back to reference Martinez-Balleste A et al (2007) A genetic approach to multivariate microaggregation for database privacy. In: 2007 IEEE 23rd International conference on data engineering workshop. IEEE Martinez-Balleste A et al (2007) A genetic approach to multivariate microaggregation for database privacy. In: 2007 IEEE 23rd International conference on data engineering workshop. IEEE
go back to reference Mol G, John S (2017) A trustworthy model in E-commerce by mining feedback comments Mol G, John S (2017) A trustworthy model in E-commerce by mining feedback comments
go back to reference Patil K, Jadhav N (2017) Multi-layer perceptron classifier and Paillier encryption scheme for friend recommendation system. In: 2017 International conference on computing, communication, control and automation (ICCUBEA). IEEE Patil K, Jadhav N (2017) Multi-layer perceptron classifier and Paillier encryption scheme for friend recommendation system. In: 2017 International conference on computing, communication, control and automation (ICCUBEA). IEEE
go back to reference Polatidis N et al (2017) Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst Appl 71:18–25 Polatidis N et al (2017) Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst Appl 71:18–25
go back to reference Rebollo-Monedero D et al (2017) p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation. Inf Sci 382:388–414 Rebollo-Monedero D et al (2017) p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation. Inf Sci 382:388–414
go back to reference Sadeghi R, Hamidzadeh J (2018) Automatic support vector data description. Soft Comput 22(1):147–158 Sadeghi R, Hamidzadeh J (2018) Automatic support vector data description. Soft Comput 22(1):147–158
go back to reference Shieh J-R (2015) An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography. In: 2015 International Carnahan Conference on Security Technology (ICCST). IEEE Shieh J-R (2015) An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography. In: 2015 International Carnahan Conference on Security Technology (ICCST). IEEE
go back to reference Silva Filho TM et al (2015) Hybrid methods for fuzzy clustering based on fuzzy c-means and improved particle swarm optimization. Expert Syst Appl 42(17–18):6315–6328 Silva Filho TM et al (2015) Hybrid methods for fuzzy clustering based on fuzzy c-means and improved particle swarm optimization. Expert Syst Appl 42(17–18):6315–6328
go back to reference Soni K, Panchal G (2017) Data security in recommendation system using homomorphic encryption. In: International conference on information and communication technology for intelligent systems. Springer, Cham Soni K, Panchal G (2017) Data security in recommendation system using homomorphic encryption. In: International conference on information and communication technology for intelligent systems. Springer, Cham
go back to reference Storch LS et al (2017) Revisiting the logistic map: a closer look at the dynamics of a classic chaotic population model with ecologically realistic spatial structure and dispersal. Theor Popul Biol 114:10–18 Storch LS et al (2017) Revisiting the logistic map: a closer look at the dynamics of a classic chaotic population model with ecologically realistic spatial structure and dispersal. Theor Popul Biol 114:10–18
go back to reference Strogatz SH (2018) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering. CRC Press, Boca RatonMATH Strogatz SH (2018) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering. CRC Press, Boca RatonMATH
go back to reference Templ M, Meindl B, Kowarik A (2013) Introduction to statistical disclosure control (SDC). In: Project: relative to the testing of SDC algorithms and provision of practical SDC, data analysis OG Templ M, Meindl B, Kowarik A (2013) Introduction to statistical disclosure control (SDC). In: Project: relative to the testing of SDC algorithms and provision of practical SDC, data analysis OG
go back to reference Wang L et al (2020) The differences in hotel selection among various types of travellers: a comparative analysis with a useful bounded rationality behavioural decision support model. Tour Manag 76:103961 Wang L et al (2020) The differences in hotel selection among various types of travellers: a comparative analysis with a useful bounded rationality behavioural decision support model. Tour Manag 76:103961
go back to reference Xiong H et al (2017) A novel recommendation algorithm frame for tourist Spots based on multi-clustering bipartite graphs. In: 2017 IEEE 2nd international conference on cloud computing and big data analysis (ICCCBDA). IEEE Xiong H et al (2017) A novel recommendation algorithm frame for tourist Spots based on multi-clustering bipartite graphs. In: 2017 IEEE 2nd international conference on cloud computing and big data analysis (ICCCBDA). IEEE
go back to reference Yang B, Lei Yu, Liu J, Li W (2017) Social collaborative filtering by trust. IEEE Trans Pattern Anal Mach Intell 39(8):1633–1647 Yang B, Lei Yu, Liu J, Li W (2017) Social collaborative filtering by trust. IEEE Trans Pattern Anal Mach Intell 39(8):1633–1647
go back to reference Yi X, Zhang Y (2009) Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Inf Syst 34(3):371–380 Yi X, Zhang Y (2009) Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Inf Syst 34(3):371–380
go back to reference You H et al (2015) An improved collaborative filtering recommendation algorithm combining item clustering and Slope One scheme. In: Proceedings of the international multi-conference of engineers and computer scientists, vol 1 You H et al (2015) An improved collaborative filtering recommendation algorithm combining item clustering and Slope One scheme. In: Proceedings of the international multi-conference of engineers and computer scientists, vol 1
go back to reference Zhan J et al (2010) Privacy-preserving collaborative recommender systems. IEEE Trans Syst Man Cybern Part C (Appl Rev) 40(4):472–476 Zhan J et al (2010) Privacy-preserving collaborative recommender systems. IEEE Trans Syst Man Cybern Part C (Appl Rev) 40(4):472–476
go back to reference Zhang F (2009) Average shilling attack against trust-based recommender systems. In: 2009 International conference on information management, innovation management and industrial engineering, vol 4. IEEE Zhang F (2009) Average shilling attack against trust-based recommender systems. In: 2009 International conference on information management, innovation management and industrial engineering, vol 4. IEEE
go back to reference Zhang F (2010) Analysis of love-hate shilling attack against e-commerce recommender system. In: 2010 International conference of information science and management engineering (ISME), vol 1. IEEE Zhang F (2010) Analysis of love-hate shilling attack against e-commerce recommender system. In: 2010 International conference of information science and management engineering (ISME), vol 1. IEEE
go back to reference Zhang J, Zhu J, Zhang N (2014) An improved privacy-preserving collaborative filtering recommendation algorithm. In: PACIS Zhang J, Zhu J, Zhang N (2014) An improved privacy-preserving collaborative filtering recommendation algorithm. In: PACIS
go back to reference Zhu T et al (2014) Privacy preserving collaborative filtering for KNN attack resisting. Soc Netw Anal Min 4(1):196MathSciNet Zhu T et al (2014) Privacy preserving collaborative filtering for KNN attack resisting. Soc Netw Anal Min 4(1):196MathSciNet
Metadata
Title
Feature selection by using privacy-preserving of recommendation systems based on collaborative filtering and mutual trust in social networks
Authors
Somayeh Moghaddam Zadeh Kashani
Javad Hamidzadeh
Publication date
12-12-2019
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 15/2020
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04605-z

Other articles of this Issue 15/2020

Soft Computing 15/2020 Go to the issue

Premium Partner