Recommendation with k-anonymized Ratings

2017·arXiv

Abstract

Abstract

Recommender systems are widely used to predict personalized preferences of goods or services using users’ past activities, such as item ratings or purchase histories. If collections of such personal activities were made publicly available, they could be used to personalize a diverse range of services, including targeted advertisement or recommendations. However, there would be an accompanying risk of privacy violations. The pioneering work of Narayanan et al. demonstrated that even if the identifiers are eliminated, the public release of user ratings can allow for the identification of users by those who have only a small amount of data on the users’ past ratings.

In this paper, we assume the following setting. A collector collects user ratings, then anonymizes and distributes them. A recommender constructs a recommender system based on the anonymized ratings provided by the collector. Based on this setting, we exhaustively list the models of recommender systems that use anonymized ratings. For each model, we then present an item-based collaborative filtering algorithm for making recommendations based on anonymized ratings. Our experimental results show that an item-based collaborative filtering based on anonymized ratings can perform better than collaborative filterings based on 5–10 non-anonymized ratings. This surprising result indicates that, in some settings, privacy protection does not necessarily reduce the usefulness of recommendations. From experimental analysis of this counterintuitive result, we observed that the sparsity of the ratings can be reduced by anonymization and the variance of the prediction can be reduced if k, the anonymization parameter, is appropriately tuned. In this way, the predictive performance of recommendations based on anonymized ratings can be improved in some settings.

Keywords: recommendation, anonymization, privacy, collaborative fil-tering

1 Introduction

With rapid advances in online services, a huge amount of information describing users’ personal activities is being collected and stored. Recommender systems that use records of user activities are widely used in diverse services, including e-commerce and information dissemination. On the other hand, records describing detailed user activities can sometime compromise privacy. For example, Narayanan et al. have reported an anonymity assessment of a dataset containing user ratings of movies, which was published as part of a competition for recommendation algorithms [6]. They demonstrated that even if the identifiers (i.e., the names of the users) are eliminated from the dataset, the public release of the dataset can allow for the reidentification of users. For example, 84% of users can be uniquely reidentified using only their preferences for eight movies that are not among the top 500 most popular movies. Due to the sparsity of user ratings, such reidentification can happen even with only a small amount of background knowledge about a target.

Considering that user ratings for recommendation are always sparse, some privacy protection is needed when user ratings are released. In this paper, we consider practical models for making recommendations based on anonymized ratings. We then introduce recommendation algorithms that fit these models and achieve a good balance of usefulness and preservation of privacy.

Related Works Recently, there have been two lines of active research concerning the preservation of privacy in recommendation systems. The objective of one of these lines of study is to preserve the privacy of the user ratings from the entity who provides the recommendation. Canny has presented a privacy-preserving recommender system that uses cryptographic tools and assumes that users communicate with each other over a peer-to-peer network[2]. In this system, the ratings are homomorphically encrypted, and then the matrix is completed without decryption by means of singular value decomposition. Polat et al. presented a recommendation scheme in which user ratings are randomized by the users themselves, and the entity that collects the user ratings performs the recommendations based on the randomized user ratings[10]. Through experiments, they examined the trade-offs between privacy and prediction accuracy in their recommendation scheme. Parra-Arnau et al. introduced a recommendation system in which the users can suppress sensitive ratings [8]. They also discussed the optimal trade-off between the suppression of ratings and privacy, but they did not explicitly discuss the effect of the privacy protection mechanism on the prediction accuracy.

In the other main line of research, the objective is to preserve privacy when releasing user ratings to be used for recommendations. Parameswaran et al. presented a scheme that first obfuscates the user ratings and then distributes them. Their obfuscation scheme does not necessarily give a mathematical guarantee of anonymity, but their experimental results revealed that it does not degrade the prediction accuracy of the recommendations[7]. Chang et al. proposed an algorithm that k-anonymizes user ratings and then constructs a recommender system based on the anonymized ratings. Recognizing that the rating matrices are sparse, Chang et al.’s idea is to first make the rating matrix dense by complementing it using singular value decomposition, and then to k-anonymize the resulting matrix[3]. Experimental results with Netflix data show that the loss of accuracy in the predictions is less with the predictive anonymization scheme than it is with the regular k-anonymization scheme.

Our Contribution Assume a collector of user ratings distributes k-anonymized ratings to the public, such as considered in [7] and [3]. The objective of our study is make a survey of all recommender systems that use anonymized ratings and then to present item-based collaborative filtering recommendation algorithms for each of these models. In general, a system that provides recommendations needs to have some information associated with each of the users in order to personalize the recommendations. Such information is referred to as the prediction input. Existing privacy-preserving recommendation algorithms implicitly assume that the system is able to relate the user who obtains a recommendation to the user who provided the anonymized ratings; however, this is not always the case in practice, because there is no guarantee that the ratings of any individual user are contained in the anonymized rating matrix that the system possesses. Even if they are contained, the recommender cannot know this.

Considering the above, we will introduce models for providing recommendations that are based on anonymized rating matrices, and which are determined by several input parameters that relate the individual who provided the ratings with the one who obtains the recommendation. We then present a recommendation algorithm for each of these models. In some models, our experimental results show that the prediction accuracy decreases when there is a strong guarantee of anonymity. This indicates that there is a trade-off between anonymity and utility; this does not contradict the conclusions of [3]. On the other hand, for some of our models, we found through experiment that the prediction accuracy of the recommendations that were based on anonymized ratings were better than those based on non-anonymized ratings, provided that the non-anonymized ratings were used as the prediction inputs. This surprising result suggests that the guarantee of anonymity does not necessarily degrade the utility if the recommendation model is appropriately chosen. Below, we analyze why we obtained this counterintuitive result.

2 Preliminaries

Recommendation System Let () = be a sparse rating matrix of n users and m items, where is the rating of user u for item i. We denote the rating matrix as (= R, where contains the ratings of user u. R contains missing values. Where has a value in R as , we denote a set of index pairs (u, i).

Let be a prediction function of ratings where and denote the sets of user and item identities, respectively. For (, the prediction of the rating is given by ˆ). Similaritybased collaborative filtering [4,12] and matrix completion via low-rank matrix approximation [9] are well known as methods for recommender systems. Note that although our proposal is demonstrated with an item-similarity based collaborative filtering system [12], the discussion in this paper is not necessarily dependent on a specific algorithm. The construction of our method, based on a low-rank matrix approximation, is presented in a longer version of this paper.

To evaluate the prediction accuracy of the recommender system, we divided into two disjoint sets: a training set train and a test set test. The set train is used to train the prediction function, and the set test is used to evaluate its accuracy at making predictions. In our experiments, the root-mean-square error (RMSE) evaluated with k-fold cross-validation was used to measure the prediction accuracy of f.

k-anonymity and k-anonymization of Rating Matrices Let T be a database with n records. We assume each record contains information associated with a single individual and consists of the identifier, quasi-identifiers (QIs), and sensitive attribute values. The identifier is a unique key that identifies the individual. the QIs are user attributes, such as age or gender; the particular combination of QIs can identify a single individual with high probability. The sensitive attribute values are the other private information. After the identifiers have been eliminated, T is said to be k-anonymous if, for any combination of the QIs that appear in T , there exist at least k individuals who have that particular combination of QIs[13]. A set of records that share the same combination of QIs is referred to as an equivalence class. Thus, if the size of all the equivalence classes in T is greater than k, T is k-anonymous.

In a recommendation system, each record contains the rating values associated with a particular individual. The rating values are usually interpreted as sensitive attribute values because they are not user attributes. However, as already mentioned in the introductory section, in some cases, there is a high probability that individuals can be uniquely identified by the ratings, particularly when T is sparse. Thus, we regard the rating values as QIs.

Let be a record associated with user u. In our setting, a record represents a rating vector, , and the database table is given as . Following the definition of k-anonymity[13], for any rating vector in T , if there exist at least 1 other rating vectors having the same rating values, then the database is k-anonymous. Let represent the k-anonymized database of T . Here, and mean that the number of rating vectors contained in T is . Since is k-anonymous, holds for any (.

Indices 1 of T and indices 1 of are referred to as the user identity and anonymized identity, respectively. The onto mapping from a user identity to an anonymized identity is defined by , where U and are the domains of the user identities and the anonymized identities, respectively.

In recommendation systems, the number of items is generally large, which means that the rating vectors tend to have high dimensionality. Since the number of combinations of rating values exponentially increases with respect to the number of items, k-anonymization by means of generalization or suppression would seriously destroy the nature of the original rating values. For k-anonymization of high-dimensional numerical values, it is known that clustering or microaggregation preserves the utility of the original data. Here is an outline of k-anonymization by clustering: First, an algorithm clusters the vectors so that every cluster contains at least k vectors. Then, each vector is replaced with the prototype of the cluster to which that vector is assigned. Algorithms for k-anonymization by clustering include the one-pass K-means algorithm (OKA)[5] and r-gather clustering [1]. The recommendation models introduced in the following sections are not dependent on a specific anonymization method, but we used the OKA in our experiments.

3 Recommendation Models Based on Anonymized Ratings

In this section, we survey the available recommendation models that are based on anonymized ratings and then examine the risks of de-anonymization of the ratings.

3.1 Stakeholders

We first introduce the four stakeholders that occur in recommendations with anonymized ratings: the rater, the rating collector, the recommender, and the user.

The rater is the entity that gives the rating values to the rating collector. The rating collector (collector for short) is the entity that collects the rating values from the raters and constructs the sparse rating matrix R. Then, if necessary, the rating collector anonymizes the rating matrix as and distributes it to the recommender. The recommender is the entity that obtains rating matrix R (or anonymized rating matrix ) from the collector and constructs the prediction function f. Then, upon request, the recommender provides recommendations to the users.

3.2 Training Input

The rating matrix that the recommender obtains from the collector is called the training input. Two types of training inputs are considered in our models.

Case 1. Let U and be the set of raters and users, respectively. We assume , as in regular recommendation systems. In this case, the prediction for any user can be personalized by using the ratings given by the user in the past. We represent the rating matrix in this case as (Table 1, line 3). If the collector anonymizes the rating matrix before providing it to the recommender, we call this Case 1A. In this case, the training input, i.e., the anonymized rating matrix, is represented as (Table 1, line 4).Case 2. In Case 2, we assume = . That is, none of the users who wish to obtain recommendations have previously given ratings to the collector. In this case, the predictions cannot be personalized based on past ratings. This situation is known as a cold start. The rating matrix in this case is represented by (Table 1, line 5). If the collector provides the anonymized rating matrix of , the situation is referred to as Case 2A (Table 1, line 6).

If the collector is a company whose customer base is comprehensive (e.g., a railway or cell phone provider), and the recommender wishes to provide recommendation services based on anonymized ratings purchased from the collector, then the recommendation system can be modeled with Case 1A. However, if the ratings are collected from a limited segment of customers and are anonymized prior to distribution, then the recommendation system can be modeled with Case 2A; this is because the customer bases of the collector and the recommender are disjoint. Of course, there are intermediate situations between Case 1/1A and Case 2/2A that can be considered; however, we will not pursue these, because they can be covered by extensions of the existing models.

3.3 Prediction Input and Models of Recommendation

In order to provide a prediction that is personalized for a particular user, the recommender needs to have information about the user. This information is referred to as prediction input. Let ) be the prediction input for user u. Below, we list possible variations of the prediction inputs. Table 1 summarizes the relationships between the training input and prediction input for the different recommendation models.

1. User identity ) = u as prediction input Regular recommendations based on non-anonymized ratings are modeled with this prediction input; users provide their identities (Case1/REG). In Case 2 and Case 2A, user identities are not contained in the training inputs. In Case 1A, the recommender cannot know the relationship between the users and the anonymous raters of the training inputs. Thus, in these cases, user identities cannot be used as prediction input.

2. Anonymous identity ) = ) as prediction input Note that this prediction input can be used only in Case 1A, because in Case 2A, we assumed the ratings of users are not contained in the training input. In Case 1A, if an anonymous identity is given to the recommender as a prediction input, the prediction is personalized not for the user, but for the anonymous identity that contains the user. Because the prediction is personalized for the k or more users that are contained in the anonymous identity, the effect of personalization can be weakened.

3. User ratings ) = as prediction input In this case, users provide some of the ratings as prediction input. In Cases 1A, 2, and 2A, the recommender cannot connect the prediction inputs with the raters in the training inputs. However, if a user can independently provide rating values, aside from the training inputs, the recommender can personalize the prediction for the user, based on the ratings provided (Case1A/UR, Case2/UR, and Case2A/UR). In Case1A/UR and Case2A/UR, the training inputs that the recommender obtains are anonymized, although the users provided non-anonymized ratings. If the users put more focus on the prediction accuracy of recommendation than on preserving anonymity, this decision is reasonable.

Table 1. Recommendation models based on anonymized ratings

Without prediction input associated with the users, the predictions cannot be personalized. In this case, the recommender can do nothing but to give the average ratings of the items (BASELINE).

3.4 Risk of Privacy Leakage

When making recommendations with anonymized ratings, two types of privacy risks should be considered. In the first case, when the anonymized ratings are used as the training input, the recommender may try to use the anonymized rating vectors to identify the raters. In the second case, when the recommender obtains the prediction input from the users, the recommender may try to use the vectors to identify the users.

In the first case, the privacy risk is dependent on the guarantee of anonymity of the training input. If it is k-anonymous, the probability with which the recommender can identify the rater is at most 1/k.

Next, we consider the risks in the second case. For Case 2A, user ratings are not contained in the collection for any type of prediction input; there is thus no risk of reidentification. For Case 1A/AI, the recommender obtains as the training input and the anonymized identity ) = ) as the prediction input. However, what the recommender can infer from this is no more than what the recommender could estimate from alone. Thus, the probability with which the recommender can reidentify the rater is again 1/k at most.

On the other hand, for Case1A/UR, if the recommender obtains ) = as the prediction input, the degree of anonymity can be decreased. For example, suppose the training input is a three-anonymized rating collection and Users 1, 2, and 3 all belong to the same anonymized identity. If the ratings of User 1 are used as the prediction input, the recommender will be able to learn the anonymized identity to which User 1 belongs. The contribution of User 1 can then be removed from the rating vector (1), which is given as the cluster center of the three users. This means that the guarantee of k-anonymity has been degraded from k-anonymity to (1)-anonymity.

Note that the anonymity can be degraded even if no information is provided that is associated with User 2 or 3. For Case1A/UR, in order to guarantee k-anonymity after the prediction, the collector needs to anonymize the rating collection with some integer larger than k. In addition, the number of user ratings that the recommender can obtain needs to be controlled so that the k-anonymity of the training input is not compromised.

4 Item-similarity Based Collaborative Filtering with Anonymized Ratings

In this section, we present recommendation algorithms that use ratings anonymized by item-similarity based collaborative filtering[12,11], using the models derived in the previous section. All there algorithms use training inputs to construct groups of similar items prior to generating personalized predictions.

Case1/REG We first introduce item-similarity based collaborative filtering without anonymization. The similarity of two items was defined to be the Pearson correlation coefficient of their ratings. Let be the set of users who rate item i. Then, the average rating of item i and the correlation coefficient between item i and item j are given by

With these item similarities, the predicted rating of item i for user u is given by

where is the set of items rated by user u.

Case2/UR Let be a user who wishes to obtain a recommendation. In the Case2/UR, the ratings of user are not contained in . Since in this case, it cannot be predicted by using eq. 2. In order to personalize the predictions, users provide the of some of items as the prediction input. Noting that item similarities can be evaluated independent of users, the prediction for can be given using as

where ¯is the set of items rated by user in . Here, note that ¯can be arbitrarily chosen by user .

Case1A/UR and Case2A/UR We now describe the algorithm for Case1A/UR.

The item similarities are evaluated from the training input = () by

where ˜is the average rating of item i evaluated with . Then, the prediction is made using the non-anonymized user ratings given as prediction inputs by

Prediction by eq. ?? makes use of the average item ratings and the item similarities estimated from the anonymized rating matrix, whereas the prediction is made for a particular user. By giving user ratings as prediction inputs, the prediction can be personalized even when the rating matrix has been anonymized.

In the algorithm for Case2A/UR, the similarities can be obtained by using eq. 4. The predictions can be made with eq. 5 if ¯is replaced with ¯, as in eq. 3.

Case1A/AI In this case, the similarities can be evaluated by eq. 5. The prediction of the rating of item i for user u becomes

where is the set of items rated by anonymous identity ) in the anonymized rating matrix . Note that predictions made by this equation are personalized for an anonymous user identity ), not for a particular user u.

BASELINE In the BASELINE model, the recommender does not have any information that can be used to personalize the prediction. Therefore, the prediction is the average of the anonymized ratings of the specified item: as evaluated by eq. 1.

In summary, Case1/REG is equivalent to [12]. Case2/UR is a well-known extension of Case1/REG for the cold-start setting. Case1A/AI is a model similar to [10] or [3]. Case1A/UR and Case2A/UR are models that, to the best of our knowledge, are newly introduced in this paper.

5 Experiments

In this section, we report the results of experiments carried out in order to evaluate the effects of anonymization on the prediction accuracy of recommendations. For these experiments, we used the MovieLens datasets[11]. The 100k dataset contains 100,000 ratings of 1682 items given by 943 users. The 1M dataset contains about a million ratings of 3883 items given by 6040 users.

Fig. 5.1. Change of RMSE w.r.t. k for Case1/REG, Case1/UR, Case1/AI, and the BASELINE model. Left: 100k data, Right: 1M data.

5.1 Experiments for Case 1 and Case1A

Settings For Case 1 and Case 1A, we assumed that all the users who received personalized predictions were contained in the set of raters, i.e., . For Case1/REG, we uniformly chose 80% of the ratings from R at random and used them as the training input. The remaining ratings were used for the test data to evaluate the RMSE.

For Case1A/AI and Case1A/UR, 80% of the ratings from were chosen uniformly at random, and then these ratings were k-anonymized using the OKA method[5]; these were used as the training input. The remaining 20% of the ratings were used as the test data. For Case1A/UR, 20% of the non-anonymized ratings , chosen uniformly at random from the training data, were used for the prediction. In the experiments, the RMSE of the recommendations with these models were measured while varying the anonymity parameter as k = 2, 3, . . . , 15.

Results The change of in the RMSE w.r.t. the anonymity parameter k for Case1/REG, Case1A/UR, Case1A/AI, and the BASELINE are shown in Fig. 5.1 . The RMSEs of Case1/REG are less than those of Case1/AI for all evaluated values of k. For Case1/AI with a larger k, the anonymous identities contain a larger number of individuals; this makes the target of the personalization vague, and the prediction accuracy deteriorates. This indicates that there is a trade-off between utility and privacy for Case1/AI.

In Case1/UR, the RMSE deteriorates as k increases. However, surprisingly, Case1A/UR achieves a prediction accuracy that is better than that of Case1/REG for all evaluated values of k. This behavior is further discussed in Section 5.3. We must bear in mind that the anonymity in Case1A/UR can be weakened if the user ratings are given to the recommender as prediction input, as discussed in Section 3.4. Because the levels of anonymity achieved for Case1A/AI and Case1A/UR are not equivalent, the RMSE of Case1A/AI and Case1A/UR are not directly comparable.

Fig. 5.2. Change of RMSE w.r.t. , the number of user ratings used as the prediction input, for Case 2 and Case 2A. Case2/REG and Case2A/UR for k = 2, 4, and 10, and the BASELINE are compared. Left: 100k data, Right: 1M data.

For Case 1A/UR, the results are significantly different between the 1M dataset and the 100k dataset. With the 1M data, the RMSE slightly improves (decreases) as k increases in the range of 2 5, then the RMSE increases as k increases in the range of 5 15. This behavior is further discussed (and further experimental results are presented) in Section 5.3.

5.2 Experiments for Case 2 and Case 2A

Settings For Case 2 and Case 2A, we assumed a cold start; none of the users who received personalized predictions were contained in the set of raters, i.e., . In Case2/UR, we uniformly chose 80% of the users in U at random, and their ratings were used as the training inputs. The ratings of the rest of the users were used for the test data to evaluate the RMSE. For the remaining 20% of the users, ratings were used as their prediction inputs and the rest of ratings were used as the test data to evaluate the RMSE. To evaluate the RMSE, 20 ratings were chosen uniformly at random to be used as prediction inputs; the RMSE averaged over these 20 trials was used as the RMSE. In these experiments, the number of ratings used as the prediction inputs, , was varied from 1 to 20; the anonymity parameter was set to k = 2, 4, 10. With these settings, we compared the changes in the RMSE for the BASELINE and the Case2/UR and Case2A/UR models w.r.t. .

Results Figure 5.2 shows the changes in the RMSE of the BASELINE, Case2/REG, and Case2A/UR w.r.t. . Case2A/UR had a better the prediction accuracy than did Case2/UR, for all values of k and . From these results, we can see that item-similarity matrices evaluated with anonymized ratings gave better predictions for both Case 1A/UR and Case 2A/UR. Furthermore, we can see that the RMSEs are not greatly affected by the degree of anonymity k for Case2A/UR. Thus, if 10, anonymization of the ratings does not damage the recommendations.

Another important observation is that the RMSE improves as , the number of ratings used in the prediction input, increases. This is because the prediction can be better personalized when there are more user ratings used as prediction inputs. The RMSE of Case2A/UR is better than that of the BASELINE when 6 in the 1M dataset and 8 in the 100k dataset. Thus, a practical solution for giving recommendations with anonymized ratings is for the users to rate only a very small number out of thousands of items. Note that the ratings used for the prediction inputs can be arbitrarily chosen by the users. If the users provide ratings of popular items that are rated by a large number of users, any privacy leakage caused by giving prediction inputs to the recommender can be ignored.

5.3 Analysis of Similarity Matrix Evaluated with Anonymized Ratings

From the experimental results in the previous subsections, we observe that the prediction accuracy of recommendations based on anonymized ratings can be better than those based on non-anonymized ratings in some settings; thus contradicts our intuition. In this subsection, we discuss the reasons of these useful but counterintuitive results.

The ratings matrices used for the recommendations are usually quite sparse. In the Movielens dataset, the sparsity is 6.3% in the 100k dataset and 4.2% in the 1M dataset. In our experiments, clustering (OKA) was used for anonymization, and the anonymized user ratings were set to the average of the user ratings that belonged to the identical anonymous identities. If some but not all users who belonged to an anonymous identity rated an item, when the ratings were anonymized, the ratings of all members of the identity were set to the average rating of those users who did rate the item. Because of this manipulation, as k increases, a larger number of unrated elements were complemented with the average ratings. Thus, the anonymized rating matrix became denser. On the one hand, if the rating matrix became denser because k was larger, the item similarities can be estimated with a larger number of ratings, and this might make the estimation of the similarities more precise. On the other hand, when k is larger, the number of users contained in a single anonymous identity also becomes larger. Thus, from the perspective of the users, the ratings of the anonymized identity do not accurately reflect their individual ratings, and this might cause the prediction accuracy to deteriorate. Thus, there exists a dilemma in setting the value of k.

When recommendations are based on item similarities, predictions are made based on the average ratings of the items and the average of the user ratings weighted by the item similarities. In order to see how k affects the prediction accuracy, we examined the behaviors of the average ratings of the items and the item similarities w.r.t. changes in k.

Figure 5.3(a) shows the changes in the item ratings eavg = ˜. In both the 100k dataset and the 1M dataset, eavg becomes larger as k becomes larger; however, the absolute value of the error is kept within 0.01: the anonymity degree k does not greatly affect the average ratings of the items.

Figure 5.3(b) shows the histogram of the item similarities with different k values. From the figure, we can see that the positive similarities frequently appear

Fig. 5.3. (a) Change of eave, the difference between the average ratings of items in R and ; (b) Histogram of ; (c) Change of evar, the variance of the difference between rating and the predicted rating ˆ

in the non-anonymized item-similarity matrix, while the negative similarities do not. This tendency changes with larger k. More precisely, by complementing the sparse rating matrix by anonymization with larger k, the frequency of negative similarities increases, whereas that of the positive similarities does not change. The estimation of item similarities between two items by using eq. ?? becomes more accurate as the number of users who rate both of the items increases. Thus, the results shown in Fig. 5.3(b) indicate that anonymization enhances the evaluation of the item similarities between items that are not similar to each other. We should bear in mind that the similarity estimation with anonymized rating matrices does not necessarily provide “better” similarities compared to those estimated with non-anonymized rating matrices.

Finally, we consider the change in the variance of the prediction: evar = w.r.t. k, where ˆis the prediction of the rating of item i for user u. In Fig. 5.3(c), the changes of variance evar are shown for the BASELINE, Case1/REG, Case1A/UR, and Case1A/AI.

For Case1/AI, the variance increases with k. The prediction for Case1/AI is personalized w.r.t. the anonymous identities. In this situation, the prediction might not be appropriately personalized when k is large, because the number of users per anonymized identity also becomes large.

For Case1/UR, the variance decreases from k = 2 to 5, then it increases. Note that the variances for Case1/UR are never larger than those for Case1/REG. For Case1/UR and Case1/REG, the user ratings used for prediction are the same, and only the similarities are different. Thus, these results indicate that the item similarities obtained from anonymized ratings are more robust than those obtained from non-anonymized ratings. For Case1/UR, when k = 4, these are in balance and the best prediction accuracy is achieved.

6 Conclusion

In this paper, we considered recommender systems that used anonymized ratings and with various types of input for training the recommendation function and for personalization of the prediction. Then, based on these models, we presented item-based collaborative filtering algorithms for providing recommendations. Our experimental results show that item-based collaborative filtering performs better with anonymized ratings than with non-anonymized ratings, when the users show 5–10 (non-anonymized) ratings to the recommender. This surprising result indicates that privacy protection does not necessarily degrade the usefulness of recommendations. From analysis of this counterintuitive result with experiments, we observed that the sparsity of the ratings can be reduced by anonymization, and the variance of the prediction can be reduced if k, the anonymization parameter, is appropriately tuned. Because of these effects, the predictive performance of the recommendation with anonymized ratings can be improved. Our future work is to expand our models to other recommendation algorithms, including matrix factorization.

References

1. Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving Anonymity via Clustering. In: Proc. of the 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. p. 153. ACM Press, New York, NY, USA (Jun 2006), http://dl.acm.org/citation.cfm?id=1142351.1142374

2. Canny, J.: Collaborative filtering with privacy. In: Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on. pp. 45–57. IEEE (2002)

3. Chang, C.C., Thompson, B., Wang, H.W., Yao, D.: Towards publishing recom- mendation data with predictive anonymization. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. pp. 24–35. ACM (2010)

4. Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval. pp. 230–237. ACM (1999)

5. Lin, J.L., Wei, M.C.: An Efficient Clustering Method for k-Anonymization. In: Proc. of the 2008 International Workshop on Privacy and Anonymity in Information Society - PAIS ’08. p. 46. ACM Press, New York, New York, USA (Mar 2008), http://dl.acm.org/citation.cfm?id=1379287.1379297

6. Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: 2008 IEEE Symposium on Security and Privacy. pp. 111–125. IEEE (May 2008), http://dl.acm.org/citation.cfm?id=1397759.1398064

7. Parameswaran, R., Blough, D.M.: Privacy preserving collaborative filtering using data obfuscation. In: Granular Computing, 2007. GRC 2007. IEEE International Conference on. pp. 380–380. IEEE (2007)

8. Parra-Arnau, J., Rebollo-Monedero, D., Forn´e, J.: A privacy-protecting architec- ture for recommendation systems via the suppression of ratings. Int. J. Secur., Appl., Sci., Eng. Res. Supp. Soc.(IJSIA) 6(2), 61–80 (2012)

9. Paterek, A.: Improving regularized singular value decomposition for collaborative filtering. In: Proceedings of KDD cup and workshop. vol. 2007, pp. 5–8 (2007)

10. Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized per- turbation techniques. In: Data Mining, 2003. ICDM 2003. Third IEEE International Conference on. pp. 625–628. IEEE (2003)

11. Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: GroupLens : An Open Architecture for Collaborative Filtering of Netnews. In: Proc. of the 1994 ACM Conference on Computer Supported Cooperative Work (1994), http://dl.acm.org/citation.cfm?id=192905

12. Sarwar, B., Karypis, G., Konstan, J., Reidl, J.: Item-based Collaborative Filtering Recommendation Algorithms. In: Proc. of the 10th International Conference on World Wide Web. pp. 285–295. ACM Press, New York, NY, USA (Apr 2001), http://dl.acm.org/citation.cfm?id=371920.372071

13. Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(05), 557–570 (2002)

Designed for Accessibility and to further Open Science