Incorporating Auxiliary Information in Collaborative Filtering Data Update with Privacy Preservation
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 4
Abstract
Online shopping has become increasingly popular in recent years. More and more people are willing to buy products through Internet instead of physical stores. For promotional purposes, almost all online merchants provide product recommendations to their returning customers. Some of them ask professional recommendation service providers to help develop and maintain recommender systems while others need to share their data with similar shops for better product recommendations. There are two issues, (1) how to protect customers’ privacy while retaining data utility before they release the data to the third parties; (2) based on (1), how to handle data growth efficiently. In this paper, we propose a NMF (Nonnegative Matrix Factorization)-based data update approach in collaborative filtering (CF) that solves the problems. The proposed approach utilizes the intrinsic property of NMF to distort the data for protecting user’s privacy. In addition, the user and item auxiliary information is taken into account in incremental nonnegative matrix tri-factorization to help improve the data utility. Experiments on three different datasets (MovieLens, Sushi and LibimSeTi) are conducted to examine the proposed approach. The results show that our approach can quickly update the new data and provide both high level privacy protection and good data utility.
Authors and Affiliations
Xiwei Wang , Jun Zhang, Pengpeng Lin, Nirmal Thapa, Yin Wang, Jie Wang
A Hazard Detection and Tracking System for People with Peripheral Vision Loss using Smart Glasses and Augmented Reality
Peripheral vision loss is the lack of ability to recognise objects and shapes in the outer area of the visual field. This condition can affect people’s daily activities and reduces their quality of life. In this work, a...
On the Dynamic Maintenance of Data Replicas based on Access Patterns in A Multi-Cloud Environment
Cloud computing provides services and infrastructures to enable end-users to access, modify and share massive geographically distributed data. There are increasing interests in developing data-intensive (big data) applic...
AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes
Mobile ad-hoc networks are vulnerable to several types of malicious routing attacks, black hole is one of those, where a malicious node advertise to have the shortest path to all other nodes in the network by the means o...
Validating a Novel Conflict Resolution Strategy Selection Method (ConfRSSM) Via Multi-Agent Simulation
Selecting a suitable conflict resolution strategy when conflicts appear in multi-agent environments is a hard problem. There is a need to develop a method that can select a suitable strategy which guaranties low cost in...
Exploiting Document Level Semantics in Document Clustering
Document clustering is an unsupervised machine learning method that separates a large subject heterogeneous collection (Corpus) into smaller, more manageable, subject homogeneous collections (clusters). Traditional metho...