Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/62604
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Surapon Riyana | en_US |
dc.contributor.author | Juggapong Natwichai | en_US |
dc.date.accessioned | 2018-11-29T07:35:09Z | - |
dc.date.available | 2018-11-29T07:35:09Z | - |
dc.date.issued | 2018-01-01 | en_US |
dc.identifier.issn | 18632394 | en_US |
dc.identifier.issn | 18632386 | en_US |
dc.identifier.other | 2-s2.0-85055989132 | en_US |
dc.identifier.other | 10.1007/s11761-018-0248-y | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85055989132&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/62604 | - |
dc.description.abstract | © 2018, Springer-Verlag London Ltd., part of Springer Nature. Since recommendation systems play an important role in the current situations where such digital transformation is highly demanded, the privacy of the individuals’ collected data in the systems must be secured effectively. In this paper, the vulnerability of the existing query framework for the recommendation systems is identified. Thus, we propose to apply the well-known k-anonymity model to generalize the given recommendation databases to satisfy the privacy preservation constraint. We show that such data generalization problem which minimizes the impact on data utility is NP-hard. To tackle with such problem, an algorithm to preserve the privacy of the individuals in the recommendation databases is proposed. The idea is to avoid excessive generalizing on the databases by forming a group of similar tuples in the databases. Thus, the impact on the data utility of the generalizing such group can be minimized. Our work is evaluated by extensive experiments. From the results, it is found that our work is highly effective, i.e., the impact quantified by the data utility metrics and the errors of the query results are less than the compared algorithms, and also it is highly efficient, i.e., the execution time is less than the result of its effectiveness-comparable algorithm by more than three times. | en_US |
dc.subject | Business, Management and Accounting | en_US |
dc.subject | Computer Science | en_US |
dc.title | Privacy preservation for recommendation databases | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Service Oriented Computing and Applications | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.