Review of Privacy-Preserving Research in Recommendation Systems

The recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model. The larger and more specific the amount of data provided by users is, the easier it is for the personal information to be inferred, which is...

Full description

Bibliographic Details
Main Author: FENG Han, YI Huawei, LI Xiaohui, LI Rui
Format: Article
Language:zho
Published: Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 2023-08-01
Series:Jisuanji kexue yu tansuo
Subjects:
Online Access:http://fcst.ceaj.org/fileup/1673-9418/PDF/2211069.pdf
_version_ 1827874771761627136
author FENG Han, YI Huawei, LI Xiaohui, LI Rui
author_facet FENG Han, YI Huawei, LI Xiaohui, LI Rui
author_sort FENG Han, YI Huawei, LI Xiaohui, LI Rui
collection DOAJ
description The recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model. The larger and more specific the amount of data provided by users is, the easier it is for the personal information to be inferred, which is easy to lead to the leakage of personal privacy, so that the user’s trust in the service provider is reduced and the relevant data are no longer provided for the system, resulting in the reduction of the system recommendation accuracy or even more difficult to complete the recommendation. Therefore, how to obtain user information for effective recommendation with high accuracy under the premise of protecting user privacy has become a research hotspot. This paper firstly summarizes the privacy-preserving technology, including differential privacy technology, homomorphic encryption technology, federated learning and secure multi-party computing technology, and compares these commonly used privacy-preserving tech-nologies. Then, from the perspective of balancing the relationship between privacy injection and recommendation accuracy, the privacy-preserving technologies adopted by the user side, the server side and the user-server side are introduced, and the research results of privacy-preserving in recommendation systems at home and abroad are systematically elaborated. Based on this, a summary, comparison, and analysis are conducted. Next, the experi-mental results of the recommendation algorithm based on differential privacy technology are compared, and the shortcomings of the corresponding technology are analyzed. Finally, the future development directions of the recommendation system based on privacy-preserving are prospected.
first_indexed 2024-03-12T16:57:34Z
format Article
id doaj.art-46a82b2fb6614e05896d24bd3e7ebef9
institution Directory Open Access Journal
issn 1673-9418
language zho
last_indexed 2024-03-12T16:57:34Z
publishDate 2023-08-01
publisher Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
record_format Article
series Jisuanji kexue yu tansuo
spelling doaj.art-46a82b2fb6614e05896d24bd3e7ebef92023-08-08T00:55:37ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182023-08-011781814183210.3778/j.issn.1673-9418.2211069Review of Privacy-Preserving Research in Recommendation SystemsFENG Han, YI Huawei, LI Xiaohui, LI Rui0School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, Liaoning 121001, ChinaThe recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model. The larger and more specific the amount of data provided by users is, the easier it is for the personal information to be inferred, which is easy to lead to the leakage of personal privacy, so that the user’s trust in the service provider is reduced and the relevant data are no longer provided for the system, resulting in the reduction of the system recommendation accuracy or even more difficult to complete the recommendation. Therefore, how to obtain user information for effective recommendation with high accuracy under the premise of protecting user privacy has become a research hotspot. This paper firstly summarizes the privacy-preserving technology, including differential privacy technology, homomorphic encryption technology, federated learning and secure multi-party computing technology, and compares these commonly used privacy-preserving tech-nologies. Then, from the perspective of balancing the relationship between privacy injection and recommendation accuracy, the privacy-preserving technologies adopted by the user side, the server side and the user-server side are introduced, and the research results of privacy-preserving in recommendation systems at home and abroad are systematically elaborated. Based on this, a summary, comparison, and analysis are conducted. Next, the experi-mental results of the recommendation algorithm based on differential privacy technology are compared, and the shortcomings of the corresponding technology are analyzed. Finally, the future development directions of the recommendation system based on privacy-preserving are prospected.http://fcst.ceaj.org/fileup/1673-9418/PDF/2211069.pdfrecommendation system; privacy-preserving; recommendation method; privacy technology
spellingShingle FENG Han, YI Huawei, LI Xiaohui, LI Rui
Review of Privacy-Preserving Research in Recommendation Systems
Jisuanji kexue yu tansuo
recommendation system; privacy-preserving; recommendation method; privacy technology
title Review of Privacy-Preserving Research in Recommendation Systems
title_full Review of Privacy-Preserving Research in Recommendation Systems
title_fullStr Review of Privacy-Preserving Research in Recommendation Systems
title_full_unstemmed Review of Privacy-Preserving Research in Recommendation Systems
title_short Review of Privacy-Preserving Research in Recommendation Systems
title_sort review of privacy preserving research in recommendation systems
topic recommendation system; privacy-preserving; recommendation method; privacy technology
url http://fcst.ceaj.org/fileup/1673-9418/PDF/2211069.pdf
work_keys_str_mv AT fenghanyihuaweilixiaohuilirui reviewofprivacypreservingresearchinrecommendationsystems