DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, J. | ko |
dc.contributor.author | Koo, D. | ko |
dc.contributor.author | Kim, Y. | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.contributor.author | Shin, J. | ko |
dc.contributor.author | Kim, S. | ko |
dc.date.accessioned | 2018-12-20T08:06:36Z | - |
dc.date.available | 2018-12-20T08:06:36Z | - |
dc.date.created | 2018-12-14 | - |
dc.date.created | 2018-12-14 | - |
dc.date.created | 2018-12-14 | - |
dc.date.created | 2018-12-14 | - |
dc.date.issued | 2018-07 | - |
dc.identifier.citation | ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4 | - |
dc.identifier.issn | 2471-2566 | - |
dc.identifier.uri | http://hdl.handle.net/10203/248773 | - |
dc.description.abstract | There are recommendation systems everywhere in our daily life. The collection of personal data of users by a recommender in the system may cause serious privacy issues. In this article, we propose the first privacy-preserving matrix factorization for recommendation using fully homomorphic encryption. Our protocol performs matrix factorization over encrypted users' rating data and returns encrypted outputs so that the recommendation system learns nothing on rating values and resulting user/item profiles. Furthermore, the protocol provides a privacy-preserving method to optimize the tuning parameters that can be a business benefit for the recommendation service providers. To overcome the performance degradation caused by the use of fully homomorphic encryption, we introduce a novel data structure to perform computations over encrypted vectors, which are essential for matrix factorization, through secure two-party computation in part. Our experiments demonstrate the efficiency of our protocol. © 2018 ACM | - |
dc.language | English | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption | - |
dc.type | Article | - |
dc.identifier.wosid | 000457158300002 | - |
dc.identifier.scopusid | 2-s2.0-85053386776 | - |
dc.type.rims | ART | - |
dc.citation.volume | 21 | - |
dc.citation.issue | 4 | - |
dc.citation.publicationname | ACM TRANSACTIONS ON PRIVACY AND SECURITY | - |
dc.identifier.doi | 10.1145/3212509 | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Kim, J. | - |
dc.contributor.nonIdAuthor | Koo, D. | - |
dc.contributor.nonIdAuthor | Kim, Y. | - |
dc.contributor.nonIdAuthor | Shin, J. | - |
dc.contributor.nonIdAuthor | Kim, S. | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Homomorphic encryption | - |
dc.subject.keywordAuthor | matrix factorization | - |
dc.subject.keywordAuthor | gradient descent | - |
dc.subject.keywordAuthor | privacy-preserving recommendation | - |
dc.subject.keywordPlus | SECURITY | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.