1 / 16

Presenter : Jian-Ren Chen Authors : Cihan Kaleli , Huseyin Polat 2012 , KBS

Privacy-preserving SOM-based recommendations on horizontally distributed data. Presenter : Jian-Ren Chen Authors : Cihan Kaleli , Huseyin Polat 2012 , KBS. Outlines. Motivation Objectives Methodology Privacy analysis Experiments Conclusions Comments. Motivation.

daxia
Download Presentation

Presenter : Jian-Ren Chen Authors : Cihan Kaleli , Huseyin Polat 2012 , KBS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy-preserving SOM-based recommendations on horizontally distributed data Presenter : Jian-Ren ChenAuthors : CihanKaleli, HuseyinPolat 2012 , KBS

  2. Outlines • Motivation • Objectives • Methodology • Privacy analysis • Experiments • Conclusions • Comments

  3. Motivation • CollaborativeFiltering (CF) systems are used to suggest web pages. • limited number of users’ data -> lack of accuracy -> Cold Start Problem • Horizontally partitioned among multiple vendors

  4. Objectives • Those companies holding inadequate number of users’ data might decide to combine their data. • accurate predictions • Performance • Privacy-preserving scheme

  5. Methodology a. Off-line i. Cluster users’ data distributed among multiplepartiesusing SOM while preserving data owners’privacy. ii. Compute aggregate data values required for recommendation estimations. b. Online i. Determine a’s cluster. ii. Estimate prediction after receiving requiredaggregate datafrom other parties. Return thereferral to a. Privacy-preserving SOM clustering on horizontally distributed data Privacy-preserving k-nn-based predictions on horizontally distributed data

  6. Methodology SOM clustering Determine values of initial constants: Find the winning Kohonen layer neuron: k-nn-based collaborative filtering Update the weight vectors of all neurons:

  7. Methodology SOM clustering Pearson correlation coefficient: k-nn-based collaborative filtering The prediction for a on q:

  8. Methodology Privacy-preserving SOM clustering on horizontally distributed data 1. number of clusters 2. sequence of active party Determine values of initial constants 1. all users it holds are assigned to a cluster 2. updated Wjvectors to the second party Privacy-preserving k-nn-based predictions on horizontally distributed data SOM 1. the next party repeats step 2 2. sends new updated Wj vectors to the next party The last party sends the updated Wjvectors to the IP

  9. Methodology Privacy-preserving SOM clustering on horizontally distributed data paq = va + P, where P is: Privacy-preserving k-nn-based predictions on horizontally distributed data among C parties, P can be written choose j percent of their zujvalues, remove their values, and replace with zero, wherej in(0,]. choose j percent of the users who did not rate q, where j in (0,)

  10. Privacy analysis • Attacks and Vulnerabilities: • A1: Parties can coalesce for capturing a target party’s data • A2: Paying-off • V1: Not able to return any result • V2: Missing values in aggregate values vector

  11. Experiments • Data sets

  12. Experiments

  13. Experiments

  14. Experiments

  15. Conclusions • Integrating split data significantly improves preciseness. • Although privacy concerns make accuracy worse, accuracy losses are smaller than the accuracy gains due to collaboration.

  16. Comments • Advantages • accuracy, performance, and privacy • Disadvantage • cost, accuracy • Applications • Collaborative Filtering • Privacy-preserving scheme

More Related