Skip to main content
Top
Published in: The Journal of Supercomputing 1/2016

01-01-2016

Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups

Authors: Ahmed M. Elmisery, Seungmin Rho, Dmitri Botvich

Published in: The Journal of Supercomputing | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In our connected world, recommender services have become widely known for their ability to provide expert and personalize information to participants of diverse applications. The excessive growth of social networks, a new kind of services are being embraced which are termed as “group based recommendation services”, where recommender services can be utilized to discover sub-communities within implicit social groups and provide referrals to new participants in order to join various sub-communities of other participants who share similar preferences or interests. Nevertheless, protecting participants’ privacy in recommendation services is a quite crucial aspect which might prevent participants from exchanging their own data with these services, which in turn detain the accuracy of the generated referrals. So in order to gain accurate referrals, recommendation services should have the ability to discover previously unknown sub-communities from different social groups in a way to preserve privacy of participants in each group. In this paper, we present a middleware that runs on end-users’ mobile phones to sanitize their profiles’ data when released for generating referrals, such that computation of referrals continues over the sanitized version of their profiles’ data. The proposed middleware is equipped with cryptography protocols to facilitate private discovery of sub-communities from the sanitized version of participants’ profiles in a university scenario. Location data are added to participants’ profiles to improve the awareness of surrounding sub-communities, so the offered referrals can be filtered based on adjacent locations for participant’s location. We performed a number of different experiments to test the efficiency and accuracy of our protocols. We also developed a formal model for the tradeoff between privacy level and accuracy of referrals. As supported by the experiments, the sub-communities were correctly identified with good accuracy and an acceptable privacy level.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Taylor D et al (2009) Privacy concern and online personalization: the moderating effects of information control and compensation. Electron Commer Res 9:203–223CrossRef Taylor D et al (2009) Privacy concern and online personalization: the moderating effects of information control and compensation. Electron Commer Res 9:203–223CrossRef
2.
go back to reference Yang CC et al (2003) Visualization of large category map for Internet browsing. Decis Support Syst 35:89–102CrossRef Yang CC et al (2003) Visualization of large category map for Internet browsing. Decis Support Syst 35:89–102CrossRef
3.
go back to reference Petrova K, Wang B (2011) Location-based services deployment and demand: a roadmap model. Electron Commer Res 11:5–29CrossRef Petrova K, Wang B (2011) Location-based services deployment and demand: a roadmap model. Electron Commer Res 11:5–29CrossRef
4.
go back to reference Xu F et al (2013) Factors affecting privacy disclosure on social network sites: an integrated model. Electron Commer Res 13:1–18 Xu F et al (2013) Factors affecting privacy disclosure on social network sites: an integrated model. Electron Commer Res 13:1–18
5.
go back to reference Smith R, Shao J (2007) Privacy and e-commerce: a consumer-centric perspective. Electron Commer Res 7:89–116CrossRef Smith R, Shao J (2007) Privacy and e-commerce: a consumer-centric perspective. Electron Commer Res 7:89–116CrossRef
6.
go back to reference Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, New York Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, New York
7.
go back to reference He J et al (2006) Inferring privacy information from social networks. In: Presented at the proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, San Diego, CA He J et al (2006) Inferring privacy information from social networks. In: Presented at the proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, San Diego, CA
8.
go back to reference Cockcroft SKS, Clutterbuck PJ (2001) Attitudes towards information privacy. ACIS 2001 Proceedings, 20 pp Cockcroft SKS, Clutterbuck PJ (2001) Attitudes towards information privacy. ACIS 2001 Proceedings, 20 pp
9.
go back to reference de Gemmis M et al (2009) Preference learning in recommender systems. In: Presented at the European conference on machine learning and principles and practice of knowledge discovery in databases (ECML/PKDD), Slovenia de Gemmis M et al (2009) Preference learning in recommender systems. In: Presented at the European conference on machine learning and principles and practice of knowledge discovery in databases (ECML/PKDD), Slovenia
10.
go back to reference McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. In: Presented at the proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. In: Presented at the proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France
11.
go back to reference Koutsabasis P et al (2008) A descriptive reference framework for the personalisation of e-business applications. Electron Commer Res 8:173–192CrossRef Koutsabasis P et al (2008) A descriptive reference framework for the personalisation of e-business applications. Electron Commer Res 8:173–192CrossRef
12.
go back to reference Esma A (2008) Experimental demonstration of a hybrid privacy-preserving recommender system, pp 161–170 Esma A (2008) Experimental demonstration of a hybrid privacy-preserving recommender system, pp 161–170
13.
go back to reference Loureiro S et al (2001) Secure data collection with updates. Electron Commer Res 1:119–130CrossRefMATH Loureiro S et al (2001) Secure data collection with updates. Electron Commer Res 1:119–130CrossRefMATH
14.
go back to reference Canny J (2002) Collaborative filtering with privacy via factor analysis. In: Presented at the proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval, Tampere, Finland Canny J (2002) Collaborative filtering with privacy via factor analysis. In: Presented at the proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval, Tampere, Finland
15.
go back to reference Canny J (2002) Collaborative filtering with privacy. In: Presented at the proceedings of the 2002 IEEE symposium on security and privacy Canny J (2002) Collaborative filtering with privacy. In: Presented at the proceedings of the 2002 IEEE symposium on security and privacy
16.
go back to reference Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Presented at the proceedings of the third IEEE international conference on data mining Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Presented at the proceedings of the third IEEE international conference on data mining
17.
go back to reference Polat H, Du W (2005) SVD-based collaborative filtering with privacy. In: Presented at the proceedings of the 2005 ACM symposium on applied computing, Santa Fe, New Mexico Polat H, Du W (2005) SVD-based collaborative filtering with privacy. In: Presented at the proceedings of the 2005 ACM symposium on applied computing, Santa Fe, New Mexico
18.
go back to reference Huang Z et al (2005) Deriving private information from randomized data. In: Presented at the proceedings of the 2005 ACM SIGMOD international conference on management of data, Baltimore, Maryland Huang Z et al (2005) Deriving private information from randomized data. In: Presented at the proceedings of the 2005 ACM SIGMOD international conference on management of data, Baltimore, Maryland
19.
go back to reference Kargupta H et al (2003) On the privacy preserving properties of random data perturbation techniques. In: Presented at the proceedings of the third IEEE international conference on data mining Kargupta H et al (2003) On the privacy preserving properties of random data perturbation techniques. In: Presented at the proceedings of the third IEEE international conference on data mining
20.
go back to reference Miller BN et al (2004) PocketLens: toward a personal recommender system. ACM Trans Inf Syst 22:437–476CrossRef Miller BN et al (2004) PocketLens: toward a personal recommender system. ACM Trans Inf Syst 22:437–476CrossRef
21.
go back to reference Swamynathan G et al (2010) The design of a reliable reputation system. Electron Commer Res 10:239–270CrossRefMATH Swamynathan G et al (2010) The design of a reliable reputation system. Electron Commer Res 10:239–270CrossRefMATH
22.
go back to reference Elmisery A, Botvich D (2013) Multi-agent based middleware for protecting privacy in IPTV content recommender services. Multimedia Tools Appl 64(2):249–275. doi:10.1007/s11042-012-1067-3 Elmisery A, Botvich D (2013) Multi-agent based middleware for protecting privacy in IPTV content recommender services. Multimedia Tools Appl 64(2):249–275. doi:10.​1007/​s11042-012-1067-3
23.
go back to reference Elmisery A, Botvich D (2012) Privacy aware recommender service using multi-agent middleware—an IPTV network scenario. Informatica 36(1):21–36 Elmisery A, Botvich D (2012) Privacy aware recommender service using multi-agent middleware—an IPTV network scenario. Informatica 36(1):21–36
24.
go back to reference Elmisery A, Botvich D (2011) Enhanced middleware for collaborative privacy in IPTV recommender services. J Converg 2:10 Elmisery A, Botvich D (2011) Enhanced middleware for collaborative privacy in IPTV recommender services. J Converg 2:10
25.
go back to reference Elmisery A, Botvich D (2011) An agent based middleware for privacy aware recommender systems in IPTV networks. In: 3rd international conference on intelligent decision technologies, University of Piraeus, Greece Elmisery A, Botvich D (2011) An agent based middleware for privacy aware recommender systems in IPTV networks. In: 3rd international conference on intelligent decision technologies, University of Piraeus, Greece
26.
go back to reference Elmisery A, Botvich D (2011) Agent based middleware for maintaining user privacy in IPTV recommender services. In: 3rd international ICST conference on security and privacy in mobile information and communication systems, Aalborg, Denmark Elmisery A, Botvich D (2011) Agent based middleware for maintaining user privacy in IPTV recommender services. In: 3rd international ICST conference on security and privacy in mobile information and communication systems, Aalborg, Denmark
27.
go back to reference Elmisery A, Botvich D (2011) Privacy aware recommender service for IPTV networks. In: 5th FTRA/IEEE international conference on multimedia and ubiquitous rngineering, Crete, Greece Elmisery A, Botvich D (2011) Privacy aware recommender service for IPTV networks. In: 5th FTRA/IEEE international conference on multimedia and ubiquitous rngineering, Crete, Greece
28.
go back to reference Elmisery AM et al (2012) Privacy aware community based recommender service for conferences attendees. In: 16th international conference on knowledge-based and intelligent information and engineering systems, San Sebastian, Spain, pp 519–531 Elmisery AM et al (2012) Privacy aware community based recommender service for conferences attendees. In: 16th international conference on knowledge-based and intelligent information and engineering systems, San Sebastian, Spain, pp 519–531
29.
go back to reference Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Jacques Stern (ed) Proceedings of the 17th international conference on Theory and application of cryptographic techniques (EUROCRYPT’99), Springer, Berlin, Heidelberg, pp 223–238 Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Jacques Stern (ed) Proceedings of the 17th international conference on Theory and application of cryptographic techniques (EUROCRYPT’99), Springer, Berlin, Heidelberg, pp 223–238
31.
go back to reference Ram J et al (2007) A secure multidimensional point inclusion protocol. In: Presented at the proceedings of the 9th workshop on multimedia and security, Dallas, Texas, USA Ram J et al (2007) A secure multidimensional point inclusion protocol. In: Presented at the proceedings of the 9th workshop on multimedia and security, Dallas, Texas, USA
32.
go back to reference Thomas T (2007) A secure multidimensional point inclusion protocol, CoRR, pp 109–120 Thomas T (2007) A secure multidimensional point inclusion protocol, CoRR, pp 109–120
33.
go back to reference Ankerst M et al (1999) OPTICS: ordering points to identify the clustering structure. In: Presented at the proceedings of the 1999 ACM SIGMOD international conference on management of data, Philadelphia, Pennsylvania, United States Ankerst M et al (1999) OPTICS: ordering points to identify the clustering structure. In: Presented at the proceedings of the 1999 ACM SIGMOD international conference on management of data, Philadelphia, Pennsylvania, United States
34.
go back to reference Metzler D et al (2007) Similarity measures for short segments of text. In: Presented at the proceedings of the 29th European conference on IR research, Rome, Italy Metzler D et al (2007) Similarity measures for short segments of text. In: Presented at the proceedings of the 29th European conference on IR research, Rome, Italy
35.
go back to reference Cuesta-Frau D et al (2003) Clustering of electrocardiograph signals in computer-aided Holter analysis. Comput Methods Programs Biomed 72:179–196CrossRef Cuesta-Frau D et al (2003) Clustering of electrocardiograph signals in computer-aided Holter analysis. Comput Methods Programs Biomed 72:179–196CrossRef
Metadata
Title
Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups
Authors
Ahmed M. Elmisery
Seungmin Rho
Dmitri Botvich
Publication date
01-01-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 1/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1574-x

Other articles of this Issue 1/2016

The Journal of Supercomputing 1/2016 Go to the issue

Premium Partner