메뉴 건너뛰기




Volumn 6, Issue 2, 2012, Pages 61-80

A privacy-protecting architecture for recommendation systems via the suppression of ratings

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY MAXIMIZATION; FUNCTIONAL BLOCK; INFORMATION OVERLOADS; KULLBACK LEIBLER DIVERGENCE; PERTURBATIVE TECHNIQUES; PRIVACY CONCERNS; PRIVACY RISKS; PROPOSED ARCHITECTURES; USER PRIVACY;

EID: 84864765349     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (53)
  • 1
    • 84864757137 scopus 로고    scopus 로고
    • [Online]. Available
    • "Amazon.com." [Online]. Available: http://www.amazon.com
  • 2
    • 84864767747 scopus 로고    scopus 로고
    • [Online]. Available
    • "Movielens." [Online]. Available: http://movielens.umn.edu
  • 3
    • 84864749035 scopus 로고    scopus 로고
    • [Online]. Available
    • "Netflix." [Online]. Available: http://www.netflix.com
  • 4
    • 84864749036 scopus 로고    scopus 로고
    • [Online]. Available
    • "Digg." [Online]. Available: http://digg.com
  • 6
    • 84976668719 scopus 로고
    • Using collaborative filtering to weave an information tapestry
    • D. Goldberg, D. Nichols, B. M. Oki, and D. Terry, "Using collaborative filtering to weave an information tapestry," Commun. ACM, vol. 35, no. 12, pp. 61-70, Dec. 1992.
    • (1992) Commun. ACM , vol.35 , Issue.12 , pp. 61-70
    • Goldberg, D.1    Nichols, D.2    Oki, B.M.3    Terry, D.4
  • 7
    • 77954418047 scopus 로고    scopus 로고
    • A survey of collaborative filtering techniques
    • X. Su and T. M. Khoshgoftaar, "A survey of collaborative filtering techniques," Adv. Artif. Intell., vol. 2009, Jan. 2009.
    • (2009) Adv. Artif. Intell. , vol.2009
    • Su, X.1    Khoshgoftaar, T.M.2
  • 8
    • 1642301688 scopus 로고    scopus 로고
    • "I didn't buy it for myself". Privacy and e-commerce personalization
    • Washington, DC
    • L. F. Cranor, ""I didn't buy it for myself". Privacy and e-commerce personalization," in Proc. Workshop Priv. Electron. Society, Washington, DC, 2003, pp. 111-117.
    • (2003) Proc. Workshop Priv. Electron. Society , pp. 111-117
    • Cranor, L.F.1
  • 9
    • 84864751602 scopus 로고    scopus 로고
    • If TiVo thinks you are gay, here's how to set it straight
    • [Online]. Available
    • J. Zaslow, "If TiVo thinks you are gay, here's how to set it straight," Nov. 2002. [Online]. Available: http://online.wsj.com/article_email/SB1038261936872356908.html
    • (2002)
    • Zaslow, J.1
  • 10
    • 0041540817 scopus 로고    scopus 로고
    • Building consumer trust online
    • D. L. Hoffman, T. P. Novak, and M. Peralta, "Building consumer trust online," Commun. ACM, vol. 42, no. 4, pp. 80-85, Apr. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.4 , pp. 80-85
    • Hoffman, D.L.1    Novak, T.P.2    Peralta, M.3
  • 11
    • 77955802941 scopus 로고    scopus 로고
    • Optimal query forgery for private information retrieval
    • D. Rebollo-Monedero and J. Forńe, "Optimal query forgery for private information retrieval," IEEE Trans. Inform. Theory, vol. 56, no. 9, pp. 4631-4642, 2010
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.9 , pp. 4631-4642
    • Rebollo-Monedero, D.1    Forńe, J.2
  • 12
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • IEEE Comput. Soc.
    • H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," in Proc. SIAM Int. Conf. Data Min. (SDM). IEEE Comput. Soc., 2003.
    • (2003) Proc. SIAM Int. Conf. Data Min. (SDM)
    • Polat, H.1    Du, W.2
  • 13
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Washington, DC: IEEE Comput. Soc.
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. IEEE Int. Conf. Data Min. (ICDM). Washington, DC: IEEE Comput. Soc., 2003, pp. 99-106
    • (2003) Proc. IEEE Int. Conf. Data Min. (ICDM) , pp. 99-106
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 15
  • 16
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • Santa Barbara, CA
    • D. Agrawal and C. C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Santa Barbara, CA, 2001, pp. 247-255.
    • (2001) Proc. ACM SIGMOD Int. Conf. Manage. Data , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.C.2
  • 17
    • 84864767745 scopus 로고    scopus 로고
    • Jester: The online joke recommender
    • [Online]. Available
    • "Jester: The online joke recommender." [Online]. Available: http://eigentaste.berkeley.edu/
  • 18
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • Tampere, Finland: ACM
    • J. Canny, "Collaborative filtering with privacy via factor analysis," in Proc. ACM SIGIR Conf. Res., Develop. Inform. Retrieval. Tampere, Finland: ACM, 2002, pp. 238-245.
    • (2002) Proc. ACM SIGIR Conf. Res., Develop. Inform. Retrieval. , pp. 238-245
    • Canny, J.1
  • 20
    • 46749120260 scopus 로고    scopus 로고
    • An architecture for privacy preserving collaborative filtering on web portals
    • Washington, DC: IEEE Comput. Soc.
    • W. Ahmad and A. Khokhar, "An architecture for privacy preserving collaborative filtering on web portals," in Proc. IEEE Int. Symp. Inform. Assurance, Secur. (IAS). Washington, DC: IEEE Comput. Soc., 2007, pp. 273-278.
    • (2007) Proc. IEEE Int. Symp. Inform. Assurance, Secur. (IAS) , pp. 273-278
    • Ahmad, W.1    Khokhar, A.2
  • 22
    • 3843049042 scopus 로고    scopus 로고
    • Pocketlens: Toward a personal recom-mender system
    • B. Miller, N. Bradley, and J. A. K. J. Riedl, "Pocketlens: Toward a personal recom-mender system," ACM Trans. Inform. Syst., vol. 22, no. 3, pp. 437-476, Jul. 2004.
    • (2004) ACM Trans. Inform. Syst. , vol.22 , Issue.3 , pp. 437-476
    • Miller, B.1    Bradley, N.2    Riedl, J.A.K.J.3
  • 24
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression," SRI Int., Tech. Rep., 1998.
    • (1998) SRI Int., Tech. Rep.
    • Samarati, P.1    Sweeney, L.2
  • 25
    • 72849133477 scopus 로고    scopus 로고
    • Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
    • X. Sun, H. Wang, J. Li, and T. M. Truta, "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing," Trans. Data Priv., vol. 1, no. 2, pp. 53-66, 2008.
    • (2008) Trans. Data Priv. , vol.1 , Issue.2 , pp. 53-66
    • Sun, X.1    Wang, H.2    Li, J.3    Truta, T.M.4
  • 30
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: Privacy beyond k-anonymity and l-diversity
    • Istanbul, Turkey
    • N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy beyond k-anonymity and l-diversity," in Proc. IEEE Int. Conf. Data Eng. (ICDE), Istanbul, Turkey, Apr. 2007, pp. 106-115.
    • (2007) Proc. IEEE Int. Conf. Data Eng. (ICDE) , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 31
    • 56749173427 scopus 로고    scopus 로고
    • From t-closeness to PRAM and noise addition via information theory
    • ser. Lecture Notes Comput. Sci. (LNCS). Istambul, Turkey: Springer-Verlag
    • D. Rebollo-Monedero, J. Forńe, and J. Domingo-Ferrer, "From t-closeness to PRAM and noise addition via information theory," in Priv. Stat. Databases (PSD), ser. Lecture Notes Comput. Sci. (LNCS). Istambul, Turkey: Springer-Verlag, Sep. 2008, pp. 100-112.
    • (2008) Priv. Stat. Databases (PSD) , pp. 100-112
    • Rebollo-Monedero, D.1    Forńe, J.2    Domingo-Ferrer, J.3
  • 32
    • 77956995886 scopus 로고    scopus 로고
    • From t-closeness-like privacy to postrandomization via information theory
    • [Online]. Available:
    • D. Rebollo-Monedero, J. Forńe, and J. Domingo-Ferrer, "From t-closeness-like privacy to postrandomization via information theory," IEEE Trans. Knowl. Data Eng., vol. 22, no. 11, pp. 1623-1636, Nov. 2010. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.190
    • (2010) IEEE Trans. Knowl. Data Eng. , vol.22 , Issue.11 , pp. 1623-1636
    • Rebollo-Monedero, D.1    Forńe, J.2    Domingo-Ferrer, J.3
  • 33
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • ser. Lecture Notes Comput. Sci. (LNCS), vol. 2482. Springer-Verlag
    • C. Díaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proc. Workshop Priv. Enhanc. Technol. (PET), ser. Lecture Notes Comput. Sci. (LNCS), vol. 2482. Springer-Verlag, Apr. 2002, pp. 54-68.
    • (2002) Proc. Workshop Priv. Enhanc. Technol. (PET) , pp. 54-68
    • Díaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 34
    • 33947365689 scopus 로고    scopus 로고
    • Anonymity and privacy in electronic services
    • Ph.D. dissertation, Katholieke Univ. Leuven
    • C. Díaz, "Anonymity and privacy in electronic services," Ph.D. dissertation, Katholieke Univ. Leuven, Dec. 2005.
    • (2005)
    • Díaz, C.1
  • 38
    • 33644989680 scopus 로고    scopus 로고
    • Specification of a framework for the anonymous use of privileges
    • V. Benjumea, J. Ĺopez, and J. M. T. Linero, "Specification of a framework for the anonymous use of privileges," Telemat., Informat., vol. 23, no. 3, pp. 179-195, Aug. 2006.
    • (2006) Telemat., Informat. , vol.23 , Issue.3 , pp. 179-195
    • Benjumea, V.1    Ĺopez, J.2    Linero, J.M.T.3
  • 41
    • 78049406696 scopus 로고    scopus 로고
    • Coprivacy: Towards a theory of sustainable privacy
    • ser. Lecture Notes Comput. Sci. (LNCS), vol. 6344. Corfu, Greece: Springer-Verlag
    • J. Domingo-Ferrer, "Coprivacy: Towards a theory of sustainable privacy," in Priv. Stat. Databases (PSD), ser. Lecture Notes Comput. Sci. (LNCS), vol. 6344. Corfu, Greece: Springer-Verlag, Sep. 2010, pp. 258-268.
    • (2010) Priv. Stat. Databases (PSD) , pp. 258-268
    • Domingo-Ferrer, J.1
  • 42
    • 0016572913 scopus 로고
    • A vector space model for automatic indexing
    • G. Salton, A. Wong, and C. S. Yang, "A vector space model for automatic indexing," Commun. ACM, vol. 18, no. 11, pp. 613-620, 1975.
    • (1975) Commun. ACM , vol.18 , Issue.11 , pp. 613-620
    • Salton, G.1    Wong, A.2    Yang, C.S.3
  • 43
    • 20844435854 scopus 로고    scopus 로고
    • Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
    • G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Trans. Knowl. Data Eng., vol. 17, no. 6, pp. 734-749, 2005.
    • (2005) IEEE Trans. Knowl. Data Eng. , vol.17 , Issue.6 , pp. 734-749
    • Adomavicius, G.1    Tuzhilin, A.2
  • 44
    • 0020187981 scopus 로고
    • On the rationale of maximum-entropy methods
    • E. T. Jaynes, "On the rationale of maximum-entropy methods," Proc. IEEE, vol. 70, no. 9, pp. 939-952, Sep. 1982.
    • (1982) Proc. IEEE , vol.70 , Issue.9 , pp. 939-952
    • Jaynes, E.T.1
  • 47
    • 0004147631 scopus 로고
    • Maximum entropy spectral analysis
    • Ph.D. dissertation, Stanford Univ
    • J. P. Burg, "Maximum entropy spectral analysis," Ph.D. dissertation, Stanford Univ., 1975.
    • (1975)
    • Burg, J.P.1
  • 48
    • 0002652285 scopus 로고    scopus 로고
    • A maximum entropy approach to natural language processing
    • A. L. Berger, J. della Pietra, and A. della Pietra, "A maximum entropy approach to natural language processing," MIT Comput. Ling., vol. 22, no. 1, pp. 39-71, Mar. 1996.
    • (1996) MIT Comput. Ling. , vol.22 , Issue.1 , pp. 39-71
    • Berger, A.L.1    della Pietra, J.2    Della Pietra, A.3
  • 49
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst., Tech. J., 1949.
    • (1949) Bell Syst., Tech. J.
    • Shannon, C.E.1
  • 51
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csisźar and J. K̈orner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 339-348
    • Csisźar, I.1    K̈orner, J.2
  • 52
    • 11944275853 scopus 로고
    • Information theory and statistical mechanics II
    • E. T. Jaynes, "Information theory and statistical mechanics II," Phys. Review Ser. II, vol. 108, no. 2, pp. 171-190, 1957.
    • (1957) Phys. Review Ser. II , vol.108 , Issue.2 , pp. 171-190
    • Jaynes, E.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.