Skip to main content
Top
Published in: Knowledge and Information Systems 8/2020

28-03-2020 | Regular Paper

Recommender systems with selfish users

Authors: Maria Halkidi, Iordanis Koutsopoulos

Published in: Knowledge and Information Systems | Issue 8/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recommender systems are a fundamental component of contemporary social-media platforms and require feedback submitted from users in order to fulfill their goal. On the other hand, the raise of advocacy about user-controlled data repositories supports the selective submission of data by user through intelligent software agents residing at the user end. These agents are endowed with the task of protecting user privacy by applying a “soft filter” on personal data provided to the system. In this work, we pose the question: “how should the software agent control the user feedback submitted to a recommender system in a way that is most privacy preserving, while the user still enjoys most of the benefits of the recommender system?”. We consider a set of such agents, each of which aims to protect the privacy of its serving user by submitting to the recommender system server a version of her real rating profile. The fact that issued recommendations to a user depend on the collective rating profiles by all agents gives rise to a novel game-theoretic setup that unveils the trade-off between privacy preservation of each user and the quality of recommendation they receive. Privacy is quantified through a distance metric between declared and an “initial” random rating profile; the latter is assumed to provide a “neutral” starting point for the disclosure of the real profile. We allow different users to have different perception of their privacy through a user-dependent utility function of this distance. The quality of recommendations for each user depends on submitted ratings of all users, including the ratings of the user to whom the recommendation is provided. We prove the existence of a Nash equilibrium point (NEP), and we derive conditions for that. We show that user strategies converge to the NEP after an iterative best-response strategy update sequence that involves circulation of aggregate quantities in the system and no revelation of real ratings. We also present various modes of user cooperation in rating declaration, by which users mutually benefit in terms of privacy. We evaluate and compare cooperative and selfish strategies in their performance in terms of privacy preservation and recommendation quality through real movie datasets.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pennacchiotti M, Silvestri F, Vahabi H, Venturini R (2012) Making your interests follow you on Twitter. In: Proceedings of CIKM Pennacchiotti M, Silvestri F, Vahabi H, Venturini R (2012) Making your interests follow you on Twitter. In: Proceedings of CIKM
2.
go back to reference Kempe D, Kleinberg JM, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of KDD Kempe D, Kleinberg JM, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of KDD
3.
go back to reference Bobadilla J, Ortega F, Hernando A, Gutiérrez A (2013) Recommender systems survey. Knowl-Based Syst 46:109–132CrossRef Bobadilla J, Ortega F, Hernando A, Gutiérrez A (2013) Recommender systems survey. Knowl-Based Syst 46:109–132CrossRef
4.
go back to reference Jeckmans A, Beye M, Erkin Z, Hartel PH, Lagendijk RL, Tang Q (2012) Privacy in recommender systems. In: Ramzan N et al (eds) Social media retrieval. Springer, London, pp 263–281 Jeckmans A, Beye M, Erkin Z, Hartel PH, Lagendijk RL, Tang Q (2012) Privacy in recommender systems. In: Ramzan N et al (eds) Social media retrieval. Springer, London, pp 263–281
5.
go back to reference Halkidi M, Koutsopoulos I (2011) A game theoretic framework for data privacy preservation in recommender systems. In: Proceedings of the PKDD Halkidi M, Koutsopoulos I (2011) A game theoretic framework for data privacy preservation in recommender systems. In: Proceedings of the PKDD
6.
go back to reference Nisan N, Roughgarden T, Tardos E, Vazirani VV (2007) Algorithmic game theory. Cambridge University Press, CambridgeCrossRef Nisan N, Roughgarden T, Tardos E, Vazirani VV (2007) Algorithmic game theory. Cambridge University Press, CambridgeCrossRef
7.
go back to reference Xu L, Jiang C, Chen Y, Ren Y, Liu KJR (2014) User participation game in collaborative filtering. In: Proceedings of the IEEE conferences signal and information processing (GlobalSIP) Xu L, Jiang C, Chen Y, Ren Y, Liu KJR (2014) User participation game in collaborative filtering. In: Proceedings of the IEEE conferences signal and information processing (GlobalSIP)
8.
go back to reference Wang J, Yu L, Zhang W, Yu G, Xu Y, Wang B, Zhang P, Zhang D (2017) IRGAN: a minimax game for unifying generative and discriminative information retrieval models. In: Proceedings of the 40th international ACM SIGIR conference on research and development in information retrieval (SIGIR’17). ACM, New York, NY, USA. pp 515–524 Wang J, Yu L, Zhang W, Yu G, Xu Y, Wang B, Zhang P, Zhang D (2017) IRGAN: a minimax game for unifying generative and discriminative information retrieval models. In: Proceedings of the 40th international ACM SIGIR conference on research and development in information retrieval (SIGIR’17). ACM, New York, NY, USA. pp 515–524
10.
go back to reference Melville P, Sindhwani V (2010) Recommender Systems, Encyclopedia of Machine Learning. Springer, New York Melville P, Sindhwani V (2010) Recommender Systems, Encyclopedia of Machine Learning. Springer, New York
11.
go back to reference Resnick P, Iacovou N, Sushak M, Bergstrom M, Reidl J (1994) Grouplens: an open architecture for collaborative filtering of NETnews. In: Proceedings of computer supported cooperative work conference Resnick P, Iacovou N, Sushak M, Bergstrom M, Reidl J (1994) Grouplens: an open architecture for collaborative filtering of NETnews. In: Proceedings of computer supported cooperative work conference
12.
go back to reference Su X, Khoshgoftaar TM (2009) A survey of collaborative filtering techniques. Advances in Artificial Intelligence, Jan 2009 Su X, Khoshgoftaar TM (2009) A survey of collaborative filtering techniques. Advances in Artificial Intelligence, Jan 2009
13.
go back to reference Linden G, Smith B, York J (2003) Amazon.com recommendations: item-to-item collaborative filtering. IEEE Intern Comput 7(1):76–80CrossRef Linden G, Smith B, York J (2003) Amazon.com recommendations: item-to-item collaborative filtering. IEEE Intern Comput 7(1):76–80CrossRef
14.
go back to reference Sarwar B, Karypis G, Konstan J, Reidl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceedings of the international conference on WWW Sarwar B, Karypis G, Konstan J, Reidl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceedings of the international conference on WWW
15.
go back to reference Balabanovic M, Shoham Y (1997) Content-based collaborative recommendation. Commun ACM 40(3):66–72CrossRef Balabanovic M, Shoham Y (1997) Content-based collaborative recommendation. Commun ACM 40(3):66–72CrossRef
16.
go back to reference Mooney RJ, Roy L (2000) Content-based book recommending using learning for text categorization. In: Proceedings of ACM conference on digital libraries Mooney RJ, Roy L (2000) Content-based book recommending using learning for text categorization. In: Proceedings of ACM conference on digital libraries
17.
go back to reference Cotter P, Smyth B (2000) PTV: intelligent personalized TV guides. In: Proceedings of AAAI/IAAI, Cotter P, Smyth B (2000) PTV: intelligent personalized TV guides. In: Proceedings of AAAI/IAAI,
18.
go back to reference Mellville P, Mooney RJ, Nagarajan R (2002) Content-boosted collaborative filtering for improved recommendations. In: Proceedings of the national conference on artificial intelligence Mellville P, Mooney RJ, Nagarajan R (2002) Content-boosted collaborative filtering for improved recommendations. In: Proceedings of the national conference on artificial intelligence
19.
go back to reference Erkin Z, Beye M, Veugen T, Lagendijk RL (2010) Privacy enhanced recommender system. In: 31st symposium on information theory in the Benelux, WIC 2010. IEEE Benelux Information Theory Chapter, pp 35–42 Erkin Z, Beye M, Veugen T, Lagendijk RL (2010) Privacy enhanced recommender system. In: 31st symposium on information theory in the Benelux, WIC 2010. IEEE Benelux Information Theory Chapter, pp 35–42
20.
go back to reference Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N, Boneh D (2013) Privacy-preserving matrix factorization. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. New York, NY, USA Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N, Boneh D (2013) Privacy-preserving matrix factorization. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. New York, NY, USA
21.
go back to reference Miller B, Konstan JA, Riedl J (2004) Pocketlens: toward a personal recommender system. ACM Trans Inf Syst 22(3):437–476CrossRef Miller B, Konstan JA, Riedl J (2004) Pocketlens: toward a personal recommender system. ACM Trans Inf Syst 22(3):437–476CrossRef
22.
go back to reference Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proceedings of the international conference on data mining (ICDM) Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proceedings of the international conference on data mining (ICDM)
23.
go back to reference Bilge A, Polat H (2012) An improved privacy-preserving DWT-based collaborative filtering scheme. Expert Syst Appl 39(3):3841–3854 CrossRef Bilge A, Polat H (2012) An improved privacy-preserving DWT-based collaborative filtering scheme. Expert Syst Appl 39(3):3841–3854 CrossRef
24.
go back to reference Basu A, Vaidya J, Kikuchi H (2012) Perturbation based privacy preserving slope one predictors for collaborative filtering. In: Dimitrakos T, Moona R, Patel D, McKnight DH (eds) Trust management VI. Springer, Berlin, pp 17–35 Basu A, Vaidya J, Kikuchi H (2012) Perturbation based privacy preserving slope one predictors for collaborative filtering. In: Dimitrakos T, Moona R, Patel D, McKnight DH (eds) Trust management VI. Springer, Berlin, pp 17–35
25.
go back to reference Berkovsky S, Eytani Y, Kuflik T, Ricci F (2007) Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of the ACM RecSys Berkovsky S, Eytani Y, Kuflik T, Ricci F (2007) Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of the ACM RecSys
26.
27.
go back to reference Casino F, Domigo-Ferrer J, Patsakis C, Puig D, Solanas A (2015) A \(k\)-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011CrossRef Casino F, Domigo-Ferrer J, Patsakis C, Puig D, Solanas A (2015) A \(k\)-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011CrossRef
28.
go back to reference Lathia N, Hailes S, Capra L (2007) Private distributed collaborative filtering using estimated concordance measures. In: Proceedings of ACM RecSys Lathia N, Hailes S, Capra L (2007) Private distributed collaborative filtering using estimated concordance measures. In: Proceedings of ACM RecSys
29.
go back to reference Canny J (2002) Collaborative filtering with privacy. In: Proceedings of the IEEE symposium on security and privacy Canny J (2002) Collaborative filtering with privacy. In: Proceedings of the IEEE symposium on security and privacy
30.
go back to reference Shokri R, Pedarsani P, Theodorakopoulos G, Hubaux JP (2009) Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: Proceedings of ACM RecSys Shokri R, Pedarsani P, Theodorakopoulos G, Hubaux JP (2009) Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: Proceedings of ACM RecSys
31.
go back to reference Kandappu T, Friedman A, Boreli R, Sivaraman V (2014) PrivacyCanary: privacy-aware recommenders with adaptive input obfuscation. In Proceedings of the MASCOTS Kandappu T, Friedman A, Boreli R, Sivaraman V (2014) PrivacyCanary: privacy-aware recommenders with adaptive input obfuscation. In Proceedings of the MASCOTS
32.
go back to reference Bilge A, Polat H (2013) A scalable privacy-preserving recommendation scheme via bisecting \(k\)-means clustering. Inf Process Manag 49(4):912–927CrossRef Bilge A, Polat H (2013) A scalable privacy-preserving recommendation scheme via bisecting \(k\)-means clustering. Inf Process Manag 49(4):912–927CrossRef
Metadata
Title
Recommender systems with selfish users
Authors
Maria Halkidi
Iordanis Koutsopoulos
Publication date
28-03-2020
Publisher
Springer London
Published in
Knowledge and Information Systems / Issue 8/2020
Print ISSN: 0219-1377
Electronic ISSN: 0219-3116
DOI
https://doi.org/10.1007/s10115-020-01460-5

Other articles of this Issue 8/2020

Knowledge and Information Systems 8/2020 Go to the issue

Premium Partner