DOI QR코드

DOI QR Code

Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms

  • Gunes, Ihsan (Computer Engineering Department, Anadolu University) ;
  • Bilge, Alper (Computer Engineering Department, Anadolu University) ;
  • Polat, Huseyin (Computer Engineering Department, Anadolu University)
  • Received : 2013.01.29
  • Accepted : 2013.05.06
  • Published : 2013.05.30

Abstract

Privacy-preserving collaborative filtering schemes are becoming increasingly popular because they handle the information overload problem without jeopardizing privacy. However, they may be susceptible to shilling or profile injection attacks, similar to traditional recommender systems without privacy measures. Although researchers have proposed various privacy-preserving recommendation frameworks, it has not been shown that such schemes are resistant to profile injection attacks. In this study, we investigate two memory-based privacy-preserving collaborative filtering algorithms and analyze their robustness against several shilling attack strategies. We first design and apply formerly proposed shilling attack techniques to privately collected databases. We analyze their effectiveness in manipulating predicted recommendations by experimenting on real data-based benchmark data sets. We show that it is still possible to manipulate the predictions significantly on databases consisting of masked preferences even though a few of the attack strategies are not effective in a privacy-preserving environment.

Keywords

References

  1. J. L. Herlocker, J. A. Konstan, L. G. Terveen and J. T. Riedl, "Evaluating collaborative filtering recommender systems," ACM Transactions on Information Systems, vol. 22, no. 1, pp. 5-53, 2004. https://doi.org/10.1145/963770.963772
  2. J.-H Park, "A recommender system for device sharing based on context-aware and personalization," KSII Transactions on Internet and Information Systems, vol. 4, no. 2, pp. 174-190, 2010.
  3. H. D. Kim, "Applying consistency-based trust definition to collaborative filtering," KSII Transactions on Internet and Information Systems, vol. 3, no. 4, pp. 366-375, 2009. https://doi.org/10.3837/tiis.2009.04.002
  4. M. P. O'Mahony, N. J. Hurley and G. C. M. Silvestre, "Towards robust collaborative filtering," Lecture Notes in Computer Science, vol. 2464, pp. 87-94, 2002.
  5. M. P. O'Mahony, N. J. Hurley NJ and G. C. M. Silvestre, "Promoting recommendations: An attack on collaborative filtering," in Proc. of the 13th International Conference on Database and Expert Systems Applications, pp. 494-503, 2002.
  6. M. P. O'Mahony, N. J. Hurley NJ and G. C. M. Silvestre, "Recommender systems: Attack types and strategies," in Proc. of the 20th National Conference on Artificial Intelligence, pp. 334-339, 2005.
  7. J. Canny, "Collaborative filtering with privacy via factor analysis," in Proc. of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 238-245, 2002.
  8. S. Berkovsky, N. Borisov, Y. Eytani, T. Kuflik and F. Ricci, "Examining users' attitude towards privacy preserving collaborative filtering," in Proc. of the Workshop on Knowledge Discovery for Ubiquitous User Modeling, June 25, 2007.
  9. H. Polat and W. Du, "Privacy-preserving collaborative filtering," International Journal of Electronic Commerce, vol. 9, no. 4, pp. 9-35, 2005.
  10. S. Berkovsky, T. Kuflik and F. Ricci, "The impact of data obfuscation on the accuracy of collaborative filtering," Expert Systems with Applications, vol. 39, no. 5, pp. 5033-5042, 2012. https://doi.org/10.1016/j.eswa.2011.11.037
  11. J. Canny, "Collaborative filtering with privacy," in Proc. of the IEEE Symposium on Security and Privacy, pp. 45-57, 2002.
  12. B. Sarwar, G. Karypis, J. A. Konstan and J. T. Riedl, "Analysis of recommendation algorithms for e-commerce," in Proc. of the 2nd ACM Conference on Electronic Commerce, pp. 158-167, 2000.
  13. Vozalis MG, Markos A and Margaritis KG. "Collaborative filtering through SVD-based and hierarchical nonlinear PCA," in Proc. of the 20th International Conference on Artificial Neural Networks: Part I. Thessaloniki, Greece, 2010, pp. 395-400.
  14. C. Yan-ni and Y. Min, "A hybrid collaborative filtering algorithm based on user-item," in Proc. of International Conference on Computational and Information Sciences, pp. 618-621, 2010.
  15. S. Russell and V. Yoon, "Applications of wavelet data reduction in a recommender system," Expert Systems with Applications, vol. 34, no. 4, pp. 2316-2325, 2008. https://doi.org/10.1016/j.eswa.2007.03.009
  16. J. L. Herlocker, J. A. Konstan, A. Borchers and J. T. Riedl, "An algorithmic framework for performing collaborative filtering," in Proc. of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 230-237, 1999.
  17. D. Goldberg, D. Nichols, B. M. Oki and D. Terry, "Using collaborative filtering to weave an information tapestry," Communications of the ACM, vol. 35, no. 12, pp. 61-70, 1992.
  18. G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 6, pp. 734-749, 2005. https://doi.org/10.1109/TKDE.2005.99
  19. N. Dokoohaki, C. Kaleli, H. Polat and M. Matskin, "Achieving optimal privacy in trust-aware social recommender systems," in Proc. of the 2nd International Conference on Social Informatics, pp. 62-79, 2010.
  20. A. Bilge, S. Gurmeric and H. Polat, "An enhanced collaborative filtering scheme via recursive clustering," in Proc. of the Workshop on Knowledge Discovery, Data Mining and Machine Learning, 2012.
  21. G. Linden, B. Smith and J. York, "Amazon.com recommendations: Item-to-item collaborative filtering," IEEE Internet Computing, vol. 7, no. 1, pp. 76-80, 2003. https://doi.org/10.1109/MIC.2003.1167344
  22. S. Berkovsky, Y. Eytani, T. Kuflik and F. Ricci, "Privacy-enhanced collaborative filtering," in Proc. of the User Modeling Workshop on Privacy-Enhanced Personalization, pp. 75-84, 2005.
  23. A. Bilge and H. Polat, "An improved privacy-preserving DWT-based collaborative filtering scheme," Expert Systems with Applications, vol. 39, no. 3, pp. 3841-3854, 2012. https://doi.org/10.1016/j.eswa.2011.09.094
  24. A. Bilge and H. Polat, "A comparison of clustering-based privacy-preserving collaborative filtering schemes," Applied Soft Computing, 2013, doi: 10.1016/j.asoc.2012.11.046.
  25. H. Polat and W. Du, "Achieving private recommendations using randomized response techniques," Lecture Notes in Computer Science, vol. 3918, pp. 637-646, 2006.
  26. A. Bilge and H. Polat, "Improving privacy-preserving NBC-based recommendations by preprocessing," in Proc. of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 143-147, 2010.
  27. C. Dellarocas, "Immunizing online reputation reporting systems against unfair ratings and discriminatory behaviour," in Proc. of the 2nd ACM Conference on Electronic Commerce, pp. 150-157, 2000.
  28. R. D. Burke, B. Mobasher and R. Bhaumik, "Limited knowledge shilling attacks in collaborative filtering systems," in Proc. of the 3rd Workshop on Intelligent Techniques for Web Personalization, 2005.
  29. R. D. Burke, B. Mobasher, C. Williams and R. Bhaumik, "Classification features for attack detection in collaborative recommender systems," in Proc. of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542-547, 2006.
  30. S. Zhang, A. Chakrabarti, J. Ford and F. Makedon, "Attack detection in time series for recommender systems," in Proc. of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 809-814, 2006.
  31. M. P. O'Mahony, "Towards robust and efficient automated collaborative filtering," PhD Dissertation, University College Dublin, 2004.
  32. J. J. Sandvig, B. Mobasher and R. D. Burke, "Robustness of collaborative recommendation based on association rule mining," in Proc. of the 1st ACM Conference on Recommender Systems, pp. 105-112, 2007.
  33. X. Yan, "Manipulation robustness of collaborative filtering systems," PhD Dissertation, Stanford University, 2009.
  34. F. G. Zhang, "A survey of shilling attacks in collaborative filtering recommender systems," in Proc. of the International Conference on Computational Intelligence and Software Engineering, pp. 1-4, 2009.
  35. S. K. Lam and J. T. Riedl, "Shilling recommender systems for fun and profit," in Proc. of the 13th International Conference on World Wide Web, pp. 393-402, 2004.
  36. S. K. Lam and J. T. Riedl, "Privacy, shilling, and the value of information in recommender systems," in Proc. of the User Modeling Workshop on Privacy-Enhanced Personalization, pp. 85-92, 2005.
  37. B. Mobasher, R. Burke, R. Bhaumik and C. Williams, "Towards trustworthy recommender systems: An analysis of attack models and algorithm robustness," ACM Transactions on Internet Technology, vol. 7, no. 4, pp. 23-60, 2007. https://doi.org/10.1145/1278366.1278372
  38. I. Gunes, C. Kaleli, A. Bilge and H. Polat, "Shilling attacks against recommender systems: A comprehensive survey," Artificial Intelligence Review, pp. 1-33, 2012.
  39. I. Gunes, A. Bilge, C. Kaleli and H. Polat, "Shilling attacks against privacy-preserving collaborative filtering," Journal of Advanced Management Science, vol. 1, no. 1, pp. 54-60, 2013. https://doi.org/10.12720/joams.1.1.54-60
  40. Z. Huang, W. Du and B. Chen, "Deriving private information from randomized data," in Proc. of the ACM SIGMOD International Conference on Management of Data, pp. 37-48, 2005.
  41. R. Bhaumik, C. A. Williams, B. Mobasher and R. D. Burke, "Securing collaborative filtering against malicious attacks through anomaly detection," in Proc. of the 4th Workshop on Intelligent Techniques for Web Personalization, 2006.
  42. R. D. Burke, B. Mobasher, R. Bhaumik and C. A. Williams, "Segment-based injection attacks against collaborative filtering recommender systems," in Proc. of the 5th IEEE International Conference on Data Mining, pp. 577-580, 2005.
  43. B. Mobasher, R. Burke, R. Bhaumik and J. J. Sandvig, "Attacks and remedies in collaborative recommendation," IEEE Intelligent Systems, vol. 22, no. 3, pp. 56-63, 2007. https://doi.org/10.1109/MIS.2007.45
  44. F. G. Zhang, "Average shilling attack against trust-based recommender Systems," in Proc. of the International Conference on Information Management, Innovation Management and Industrial Engineering, pp. 588-591, 2009.

Cited by

  1. Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings vol.8, pp.8, 2013, https://doi.org/10.3837/tiis.2014.08.022
  2. From existing trends to future trends in privacy‐preserving collaborative filtering vol.5, pp.6, 2013, https://doi.org/10.1002/widm.1163
  3. Detecting shilling attacks in private environments vol.19, pp.6, 2013, https://doi.org/10.1007/s10791-016-9284-4
  4. Shilling attacks against collaborative recommender systems: a review vol.53, pp.1, 2020, https://doi.org/10.1007/s10462-018-9655-x