Privacy risks in recommender systems - Internet Computing, IEEE

نویسندگان

  • Naren Ramakrishnan
  • Benjamin J. Keller
  • Batul J. Mirza
  • Virginia Tech
  • Ananth Y. Grama
چکیده

R ecommender systems have become important tools in ecommerce. They combine one user’s ratings of products or services with ratings from other users to answer queries such as “Would I like X?” with predictions and suggestions. Users thus receive anonymous recommendations from people with similar tastes. While this process seems innocuous, it aggregates user preferences in ways analogous to statistical database queries, which can be exploited to identify information about a particular user. This is especially true for users with eclectic tastes who rate products across different types or domains in the systems. These straddlers highlight the conflict between personalization and privacy in recommender systems. While straddlers enable serendipitous recommendations, information about their existence could be used in conjunction with other data sources to uncover identities and reveal personal details. We use a graph-theoretic model to study the benefit from and risk to straddlers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Risks in Recommender Systems

R ecommender systems have become important tools in ecommerce. They combine one user’s ratings of products or services with ratings from other users to answer queries such as “Would I like X?” with predictions and suggestions. Users thus receive anonymous recommendations from people with similar tastes. While this process seems innocuous, it aggregates user preferences in ways analogous to stat...

متن کامل

Privacy in Recommender Systems

In many online applications, the range of content that is offered to users is so wide that a need for automated recommender systems arises. Such systems can provide a personalized selection of relevant items to users. In practice, this can help people find entertaining movies, boost sales through targeted advertisements, or help social network users meet new friends. To generate accurate person...

متن کامل

On the Trusted Use of Large-Scale Personal Data

Large-scale personal data has become the new oil of the Internet. However, personal data tend to be monopolized and siloed by online services which not only impedes beneficial uses but also prevents users from managing the risks associated with their data. While there is substantial legal and social policy scholarship concerning ownership and fair use of personal data, a pragmatic technical sol...

متن کامل

Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems

W ITH the continuous drive towards availability of data and services anytime anywhere, privacy risks have significantly increased. We are now witnessing vast amounts of privacy-sensitive data being collected, sometimes unintentionally, in a myriad of different types of networks. Unauthorized disclosure, modification, usage, or denial of access to these data may result in high human and financia...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001