Incorporating Auxiliary Information in Collaborative Filtering Data Update with Privacy Preservation
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 4
Abstract
Online shopping has become increasingly popular in recent years. More and more people are willing to buy products through Internet instead of physical stores. For promotional purposes, almost all online merchants provide product recommendations to their returning customers. Some of them ask professional recommendation service providers to help develop and maintain recommender systems while others need to share their data with similar shops for better product recommendations. There are two issues, (1) how to protect customers’ privacy while retaining data utility before they release the data to the third parties; (2) based on (1), how to handle data growth efficiently. In this paper, we propose a NMF (Nonnegative Matrix Factorization)-based data update approach in collaborative filtering (CF) that solves the problems. The proposed approach utilizes the intrinsic property of NMF to distort the data for protecting user’s privacy. In addition, the user and item auxiliary information is taken into account in incremental nonnegative matrix tri-factorization to help improve the data utility. Experiments on three different datasets (MovieLens, Sushi and LibimSeTi) are conducted to examine the proposed approach. The results show that our approach can quickly update the new data and provide both high level privacy protection and good data utility.
Authors and Affiliations
Xiwei Wang , Jun Zhang, Pengpeng Lin, Nirmal Thapa, Yin Wang, Jie Wang
kEFCM: kNN-Based Dynamic Evolving Fuzzy Clustering Method
Despite the recent emergence of research, creating an evolving fuzzy clustering method that intelligently copes with huge amount of data streams in the present high-speed networks involves a lot of difficulties. Several...
FPGA Architecture for Kriging Image Interpolation
This paper proposes an ultrafast scalable embedded image compression scheme based on discrete cosine transform. It is designed for general network architecture that guarantees maximum end-to-end delay (EED), in particula...
Processing the Text of the Holy Quran: a Text Mining Study
The Holy Quran is the reference book for more than 1.6 billion of Muslims all around the world Extracting information and knowledge from the Holy Quran is of high benefit for both specialized people in Islamic studies as...
Hybrid Latin-Hyper-Cube-Hill-Climbing Method for Optimizing: Experimental Testing
A noticeable objective of this work is to experiment and test an optimization problem through comparing hill-climbing method with a hybrid method combining hill-climbing and Latin-hyper-cube. These two methods are going...
Resource Provisioning in Single Tier and Multi-Tier Cloud Computing: “State-of-the-Art”
Cloud computing is a new computation trend for delivering information as long as an electronic device needs to access of a web server. One of the major pitfalls in cloud computing is related to optimizing the resource pr...