Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2009-01
Add to Favorite Get Latest Update

Research on Privacy-Preserving Two-Party Collaborative Filtering Recommendation

ZHANG Feng1,2,SUN Xue-dong1,CHANG Hui-you1,ZHAO Gan-sen1 (1.Software School,Sun Yat-sen University,Guangzhou,Guangdong 510275,China;2.Guangdong Key Laboratory of Information Security Technology,Sun Yat-sen University,Guangzhou,Guangdong 510275,China)  
Privacy-preserving collaborative filtering aims at protecting participating parties' privacy while providing high-quality recommendations efficiently.In the case of the number of the participating parties is greater than 2,a protocol,employing commutative encryption as its major privacy-preserving technique,has been devised to address the issue of rating a specific item in scenarios with distributed data storage,which is a key challenge in privacy-preserving collaborative filtering recommendation in that scenarios.However,the protocol does not work when the number of the participating parties is exactly 2.Employing secure comparison and secure dot product as its fundamental security infrastructure,we design a privacy-preserving two-party collaborative computing protocol to address the challenge.This protocol produces the same results as the traditional memory-based collaborative filtering recommender systems.Based on secure multi-party computation theory and simulation paradigm,the protocol's security is proved.The protocol's computation complexity and communication cost are examined as well.
【Fund】: 广东省自然科学基金重点项目(No.05100302);; 广东省信息安全技术重点实验室开放基金;; 中山大学青年教师科研启动基金(No.1131014)
【CateGory Index】: TP311.13
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 LUO Yong-long,HUANG Liu-sheng,JING Wei-wei,YAO Yi-fei,CHEN Guo-liang (Department of Computer Science,University of Science and Technology of China,Hefei,Anhui 230027,China;National High Performance Computing Center at Hefei,Hefei,Anhui 230027,China);An Algorithm for Privacy-preserving Boolean Association Rule Mining[J];Acta Electronica Sinica;2005-05
2 HUANG Yi-qun,LU Zheng-ding,HU He-ping,LI Rui-xuan(School of Computer Science & Technology,Huazhong University and Technology,Wuhan,Hubei 430074,China);Privacy Preserving Outlier Detection[J];Acta Electronica Sinica;2006-05
3 ZHANG Feng CHANG Hui-You (School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275);Research on Privacy-Preserving Collaborative Filtering Recommendation Based on Distributed Data[J];Chinese Journal of Computers;2006-08
Chinese Journal Full-text Database 10 Hits
1 LUO Yong-long1,2,HUANG Liu-sheng1,XU Wei-jiang1,JING Wei-wei1(1.Department of Computer Science,University of Science and Technology of China,Hefei,Anhui 230027,China;2.Department of Computer Science,Anhui Normal University,Wuhu,Anhui 241000,China);A Protocol for Privacy-Preserving Intersect-Determination of Two Polygons[J];Acta Electronica Sinica;2007-04
2 ZHU Si-zheng1,CHEN Shi-ping2 (1.School of Optical-Electrical and Computer Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China;2.Center of Network,University of Shanghai for Science and Technology,Shanghai 200093,China);Improved method of privacy-preserving association rule mining[J];Journal of University of Shanghai for Science and Technology;2009-01
3 ZHANG Rui,ZHENG Cheng,CHEN Juan-juan 1.School of Computer Science and Technology,Anhui University,Hefei 230039,China 2.Educational Department Key Laboratory of Intelligent Computing & Signal Processing,Anhui University,Hefei 230039,China;Simple method on privacy preserving in association rules mining[J];Computer Engineering and Applications;2008-28
4 LU Shao-feng1,2,LUO Yong-long1,21.Key Laboratory of Geography Information System,Anhui Normal University,Wuhu,Anhui 241003,China 2.Department of Computer Science,Anhui Normal University,Wuhu,Anhui 241003,China;Privacy-preserving in Graham algorithm for finding convex hulls[J];Computer Engineering and Applications;2008-36
5 GENG Bo,ZHONG Hong,PENG Jun,WANG Da-gang(School of Computer and Information,Anhui University,Hefei 230039);Temporal Rule Distribution Mining of Privacy-preserving[J];Computer Engineering;2008-24
6 LUO Yong-Long HUANG Liu-Sheng JING Wei-Wei XU Wei-Jiang CHEN Guo-Liang (Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027) (Anhui Province Key Laboratory of Software in Computing and Communication, Hefei 230027)(National High Performance Computing Center at Hefei, Hefei 230027);Privacy-Preserving Cross Product Protocol and Its Applications[J];Chinese Journal of Computers;2007-02
7 ZHOU Shui-Geng 1),2)LI Feng 1)TAO Yu-Fei 3)XIAO Xiao-Kui 4)1)(School of Computer Science and Technology,Fudan University,Shanghai 200433)2)(Shanghai Key Laboratory of Intelligent Information Processing,Fudan University,Shanghai 200433)3)(Department of Computer Science and Engineering,Chinese University of Hong Kong,Hong Kong,China)4)(Department of Computer Science,Cornell University,USA);Privacy Preservation in Database Applications:A Survey[J];Chinese Journal of Computers;2009-05
8 ZHONG Bo, ZHANG Yuanping (School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050);An Algorithm for Privacy-preserving Ordinal Association Rule Mining[J];Science Technology and Engineering;2006-24
9 YUAN Ying,LIU Guo-hua,ZHANG Yu,LI Ying (College of Information Engineering and Science,Yanshan University,Qinhuangdao 066004);Sensitive Information Retrieval Method with Minimal Information Sharing[J];Computer Engineering;2009-16
10 LU Shao-feng1,2,LUO Yong-long1,2,31.Key Laboratory of Geography Information System,Anhui Normal University,Wuhu,Anhui 241003,China 2.Department of Computer Science,Anhui Normal University,Wuhu,Anhui 241003,China 3.Department of Computer Science,University of Science and Technology of China,Hefei 230027,China;Privacy-preserving signed distance protocol[J];Computer Engineering and Applications;2009-33
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 LUO Wen-Jun LI Xiang (Institute of Computer Science, Guizhou University, Guiyang 550025);The Secure Multi-Party Protocol of Matrix Product and Its Application[J];Chinese Journal of Computers;2005-07
2 QIN Jing1,2+, ZHANG Zhen-Feng2, FENG Deng-Guo2, LI Bao2 1(School of Mathematics and System Science, Shandong University, Ji抧an 250100, China) 2(State Key Laboratory of Information Security (Graduate School, The Chinese Academy of Sciences), Beijing 100039, China);A Protocol of Comparing Information without Leaking[J];Journal of Software;2004-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved