Title
Recommendation in the end-to-end encrypted domain
Abstract
In recommendation systems, a central host typically requires access to user profiles in order to generate useful recommendations. This access, however, undermines user privacy; the more information is revealed to the host, the more the user's privacy is compromised. In this paper, we propose a novel end-to-end encrypted recommendation mechanism which encrypts sensitive private data at the user end, without ever exposing plaintext private data to the host server. Unlike previously proposed privacy-preserving recommendation mechanisms, the data in this proposed system are lossless - a pivotal feature to many applications, e.g., in health informatics, business analytics, cyber security, etc. We achieve this goal by developing encrypted-domain polynomial ring homomorphism cryptographic algorithms to compute similarity of encrypted scores on the server, so that collaborative recommendations can be computed in the encryption domain and only an authorized person can decrypt the exact results. We also propose a novel key management system to make sure private information retrieval and recommendation computations can be executed in the encrypted domain in practice. Our experiments show that the proposed scheme offers robust security and lossless accurate recommendation, as well as high efficiency. Our preliminary results show the recommendation accuracy is 21% better than the existing statistical lossy privacy-preserving mechanisms based on random perturbation and user profile distribution. This new approach can potentially be applied to various data mining and cloud computing environments and significantly alleviates the privacy concerns of users.
Year
DOI
Venue
2011
10.1145/2063576.2063708
CIKM
Keywords
DocType
Citations 
collaborative recommendation,recommendation system,privacy-preserving recommendation mechanism,useful recommendation,recommendation computation,user end,undermines user privacy,recommendation accuracy,lossless accurate recommendation,novel end-to-end encrypted recommendation,end-to-end encrypted domain,polynomial ring,key management,cloud computing,personalization,recommender system,privacy,cyber security,recommender systems,private information retrieval,data mining,health informatics
Conference
1
PageRank 
References 
Authors
0.36
12
3
Name
Order
Citations
PageRank
Jyh-Ren Shieh1544.56
Ching-yung Lin21963175.16
Ja-ling Wu31569168.11