Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption

Cited 36 time in webofscience Cited 0 time in scopus
  • Hit : 955
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, J.ko
dc.contributor.authorKoo, D.ko
dc.contributor.authorKim, Y.ko
dc.contributor.authorYoon, Hyunsooko
dc.contributor.authorShin, J.ko
dc.contributor.authorKim, S.ko
dc.date.accessioned2018-12-20T08:06:36Z-
dc.date.available2018-12-20T08:06:36Z-
dc.date.created2018-12-14-
dc.date.created2018-12-14-
dc.date.created2018-12-14-
dc.date.created2018-12-14-
dc.date.issued2018-07-
dc.identifier.citationACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4-
dc.identifier.issn2471-2566-
dc.identifier.urihttp://hdl.handle.net/10203/248773-
dc.description.abstractThere are recommendation systems everywhere in our daily life. The collection of personal data of users by a recommender in the system may cause serious privacy issues. In this article, we propose the first privacy-preserving matrix factorization for recommendation using fully homomorphic encryption. Our protocol performs matrix factorization over encrypted users' rating data and returns encrypted outputs so that the recommendation system learns nothing on rating values and resulting user/item profiles. Furthermore, the protocol provides a privacy-preserving method to optimize the tuning parameters that can be a business benefit for the recommendation service providers. To overcome the performance degradation caused by the use of fully homomorphic encryption, we introduce a novel data structure to perform computations over encrypted vectors, which are essential for matrix factorization, through secure two-party computation in part. Our experiments demonstrate the efficiency of our protocol. © 2018 ACM-
dc.languageEnglish-
dc.publisherASSOC COMPUTING MACHINERY-
dc.titleEfficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption-
dc.typeArticle-
dc.identifier.wosid000457158300002-
dc.identifier.scopusid2-s2.0-85053386776-
dc.type.rimsART-
dc.citation.volume21-
dc.citation.issue4-
dc.citation.publicationnameACM TRANSACTIONS ON PRIVACY AND SECURITY-
dc.identifier.doi10.1145/3212509-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorKim, J.-
dc.contributor.nonIdAuthorKoo, D.-
dc.contributor.nonIdAuthorKim, Y.-
dc.contributor.nonIdAuthorShin, J.-
dc.contributor.nonIdAuthorKim, S.-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorHomomorphic encryption-
dc.subject.keywordAuthormatrix factorization-
dc.subject.keywordAuthorgradient descent-
dc.subject.keywordAuthorprivacy-preserving recommendation-
dc.subject.keywordPlusSECURITY-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 36 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0