Review of Privacy-Preserving Research in Recommendation Systems
The recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model. The larger and more specific the amount of data provided by users is, the easier it is for the personal information to be inferred, which is...
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
2023-08-01
|
Series: | Jisuanji kexue yu tansuo |
Subjects: | |
Online Access: | http://fcst.ceaj.org/fileup/1673-9418/PDF/2211069.pdf |
_version_ | 1827874771761627136 |
---|---|
author | FENG Han, YI Huawei, LI Xiaohui, LI Rui |
author_facet | FENG Han, YI Huawei, LI Xiaohui, LI Rui |
author_sort | FENG Han, YI Huawei, LI Xiaohui, LI Rui |
collection | DOAJ |
description | The recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model. The larger and more specific the amount of data provided by users is, the easier it is for the personal information to be inferred, which is easy to lead to the leakage of personal privacy, so that the user’s trust in the service provider is reduced and the relevant data are no longer provided for the system, resulting in the reduction of the system recommendation accuracy or even more difficult to complete the recommendation. Therefore, how to obtain user information for effective recommendation with high accuracy under the premise of protecting user privacy has become a research hotspot. This paper firstly summarizes the privacy-preserving technology, including differential privacy technology, homomorphic encryption technology, federated learning and secure multi-party computing technology, and compares these commonly used privacy-preserving tech-nologies. Then, from the perspective of balancing the relationship between privacy injection and recommendation accuracy, the privacy-preserving technologies adopted by the user side, the server side and the user-server side are introduced, and the research results of privacy-preserving in recommendation systems at home and abroad are systematically elaborated. Based on this, a summary, comparison, and analysis are conducted. Next, the experi-mental results of the recommendation algorithm based on differential privacy technology are compared, and the shortcomings of the corresponding technology are analyzed. Finally, the future development directions of the recommendation system based on privacy-preserving are prospected. |
first_indexed | 2024-03-12T16:57:34Z |
format | Article |
id | doaj.art-46a82b2fb6614e05896d24bd3e7ebef9 |
institution | Directory Open Access Journal |
issn | 1673-9418 |
language | zho |
last_indexed | 2024-03-12T16:57:34Z |
publishDate | 2023-08-01 |
publisher | Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press |
record_format | Article |
series | Jisuanji kexue yu tansuo |
spelling | doaj.art-46a82b2fb6614e05896d24bd3e7ebef92023-08-08T00:55:37ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182023-08-011781814183210.3778/j.issn.1673-9418.2211069Review of Privacy-Preserving Research in Recommendation SystemsFENG Han, YI Huawei, LI Xiaohui, LI Rui0School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, Liaoning 121001, ChinaThe recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model. The larger and more specific the amount of data provided by users is, the easier it is for the personal information to be inferred, which is easy to lead to the leakage of personal privacy, so that the user’s trust in the service provider is reduced and the relevant data are no longer provided for the system, resulting in the reduction of the system recommendation accuracy or even more difficult to complete the recommendation. Therefore, how to obtain user information for effective recommendation with high accuracy under the premise of protecting user privacy has become a research hotspot. This paper firstly summarizes the privacy-preserving technology, including differential privacy technology, homomorphic encryption technology, federated learning and secure multi-party computing technology, and compares these commonly used privacy-preserving tech-nologies. Then, from the perspective of balancing the relationship between privacy injection and recommendation accuracy, the privacy-preserving technologies adopted by the user side, the server side and the user-server side are introduced, and the research results of privacy-preserving in recommendation systems at home and abroad are systematically elaborated. Based on this, a summary, comparison, and analysis are conducted. Next, the experi-mental results of the recommendation algorithm based on differential privacy technology are compared, and the shortcomings of the corresponding technology are analyzed. Finally, the future development directions of the recommendation system based on privacy-preserving are prospected.http://fcst.ceaj.org/fileup/1673-9418/PDF/2211069.pdfrecommendation system; privacy-preserving; recommendation method; privacy technology |
spellingShingle | FENG Han, YI Huawei, LI Xiaohui, LI Rui Review of Privacy-Preserving Research in Recommendation Systems Jisuanji kexue yu tansuo recommendation system; privacy-preserving; recommendation method; privacy technology |
title | Review of Privacy-Preserving Research in Recommendation Systems |
title_full | Review of Privacy-Preserving Research in Recommendation Systems |
title_fullStr | Review of Privacy-Preserving Research in Recommendation Systems |
title_full_unstemmed | Review of Privacy-Preserving Research in Recommendation Systems |
title_short | Review of Privacy-Preserving Research in Recommendation Systems |
title_sort | review of privacy preserving research in recommendation systems |
topic | recommendation system; privacy-preserving; recommendation method; privacy technology |
url | http://fcst.ceaj.org/fileup/1673-9418/PDF/2211069.pdf |
work_keys_str_mv | AT fenghanyihuaweilixiaohuilirui reviewofprivacypreservingresearchinrecommendationsystems |