4.5 Article

Towards privacy preserving social recommendation under personalized privacy settings

期刊

出版社

SPRINGER
DOI: 10.1007/s11280-018-0620-z

关键词

Differential privacy; Social recommendation; Ranking; Personalized privacy settings

资金

  1. National Science Foundation of China [61672500, 61572474]
  2. Program of International ST Cooperation [2016YFE0121500]
  3. National Science Foundation (NSF) [1614576]
  4. Office of Naval Research (ONR) [N00014-16-1-2257]

向作者/读者索取更多资源

Privacy leakage is an important issue for social relationships-based recommender systems (i.e., social recommendation). Existing privacy preserving social recommendation approaches usually allow the recommender to fully control users' information. This may be problematic since the recommender itself may be untrusted, leading to serious privacy leakage. Besides, building social relationships requires sharing interests as well as other private information, which may lead to more privacy leakage. Although sometimes users are allowed to hide their sensitive private data using personalized privacy settings, the data being shared can still be abused by the adversaries to infer sensitive private information. Supporting social recommendation with least privacy leakage to untrusted recommender and other users (i.e., friends) is an important yet challenging problem. In this paper, we aim to achieve privacy-preserving social recommendation under personalized privacy settings. We propose PrivSR, a novel privacy-preserving social recommendation framework, in which user can model user feedbacks and social relationships privately. Meanwhile, by allocating different noise magnitudes to personalized sensitive and non-sensitive feedbacks, we can protect users' privacy against untrusted recommender and friends. Theoretical analysis and experimental evaluation on real-world datasets demonstrate that our framework can protect users' privacy while being able to retain effectiveness of the underlying recommender system.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

User-friendly deniable storage for mobile devices

Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan Wang

COMPUTERS & SECURITY (2018)

Proceedings Paper Computer Science, Theory & Methods

TrustZone Enhanced Plausibly Deniable Encryption System for Mobile Devices

Jinghui Liao, Bo Chen, Weisong Shi

Summary: Modern mobile devices are used to store and process sensitive information, and a new PDE system has been proposed to protect the data and device owners. This system isolates hidden and public data, and incorporates deniability features into ARM TrustZone for immunity to side-channel attacks.

2021 ACM/IEEE 6TH SYMPOSIUM ON EDGE COMPUTING (SEC 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Towards Stealing Deep Neural Networks on Mobile Devices

Shashank Reddy Danda, Xiaoyong Yuan, Bo Chen

Summary: This work investigates model stealing attacks on deep neural networks running on mobile devices for the first time, confirming the feasibility of stealing DNN models with high accuracy and small overhead from mobile devices.

SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II (2021)

Proceedings Paper Computer Science, Information Systems

Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography

Niusen Chen, Wen Xie, Bo Chen

Summary: mobiDOM is proposed to securely detect OS-level malware in mobile computing devices by integrating a malware detector in the flash translation layer and building a trusted application in the Arm TrustZone secure world to communicate covertly. Security analysis and experiments have shown that mobiDOM can effectively detect OS-level malware securely.

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021 (2021)

Article Computer Science, Information Systems

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

Weijing You, Lei Lei, Bo Chen, Limin Liu

Summary: Deduplication can significantly reduce storage cost by storing unique copies of duplicate data. However, when combined with confidentiality, encryption may complicate deduplication. The Message-Locked Encryption (MLE) is utilized to ensure deduplicability even after encryption by different data owners. Re-encrypting outsourced data is crucial for continuous confidentiality, and the SEDER system addresses this by leveraging AONT, designing DRE, and proposing PoWC. Security analysis and experimental evaluation validate the security and efficiency of SEDER.

INFORMATION (2021)

Proceedings Paper Computer Science, Information Systems

eHIFS: An Efficient History Independent File System

Biao Gao, Bo Chen, Shijie Jia, Luning Xia

PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Personalized Privacy-Preserving Social Recommendation

Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, Yujun Zhang

THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE (2018)

Proceedings Paper Computer Science, Theory & Methods

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices

Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching

2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2018)

Proceedings Paper Computer Science, Information Systems

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer

Shijie Jia, Luning Xia, Bo Chen, Peng Liu

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Information Systems

Remote data integrity checking with server-side repair

Bo Chen, Reza Curtmola

JOURNAL OF COMPUTER SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices

Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia

33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Privacy-preserving Query Log Sharing Based on Prior N-word Aggregation

Xuying Meng, Zhiwei Xu, Bo Chen, Yujun Zhang

2016 IEEE TRUSTCOM/BIGDATASE/ISPA (2016)

Proceedings Paper Computer Science, Information Systems

What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN

Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang

2016 IEEE TRUSTCOM/BIGDATASE/ISPA (2016)

Article Computer Science, Information Systems

Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey

Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen

CYBERSECURITY (2018)

暂无数据