Abstract
The growth of online social networks has seen the utilisation of these network graphs for the purpose of providing recommendations. Automated recommendations, however, do not take into account inter-personal trust levels that exist in a social network. In this article, we propose a privacy-preserving trusted social feedback (TSF) scheme where users can obtain feedback on questions from their friends whom they trust. We show that the concept can be extended to the domain of crowdsourcing -- the trusted crowdsourcing (TCS) scheme. In crowdsourcing, instead of asking friends, one can solicit opinions from experts in the crowd through a privacy preserving trusted feedback mechanism. Our proposal supports categorical answers as well as single-valued numerical answers. We evaluate our proposals in a number of ways: based on a prototype implementation built atop the Google App Engine, we illustrate the performance of the trusted social feedback. In addition, we present a user study to measure the impact that our trusted social feedback proposal has on users' perception of privacy and on foreground trust. We also present another user study to capture a model for user acceptance testing of the trusted crowdsourcing.
- A. Basu, J. C. Corena, S. Kiyomoto, S. Marsh, J. Vaidya, G. Guo, J. Zhang, and Y. Miyake. Privacy preserving trusted social feedback. In Proceedings of the 29th ACM Symposium on Applied Computing (SAC) TRECK track, Gyeongju, Korea, 2014. Google ScholarDigital Library
- A. Basu, J. C. Corena, S. Kiyomoto, J. Vaidya, S. Marsh, and Y. Miyake. PrefRank: fair aggregation of subjective user preferences. In Proceedings of the 29th ACM Symposium on Applied Computing (SAC) RS track, Gyeongju, Korea, 2014. Google ScholarDigital Library
- A. Basu, J. Vaidya, and H. Kikuchi. Perturbation based privacy preserving Slope One predictors for collaborative filtering. In Proceedings of the 6th IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Surat, India, 2012.Google ScholarCross Ref
- A. Basu, J. Vaidya, H. Kikuchi, T. Dimitrakos, and S. K. Nair. Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications, 1(8), 2012.Google Scholar
- S. Berkovsky, Y. Eytani, T. Kuflik, and F. Ricci. Privacy-enhanced collaborative filtering. In Proc. User Modeling Workshop on Privacy-Enhanced Personalization, 2005.Google Scholar
- J. Canny. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR '02, pages 238--245, New York, NY, USA, 2002. ACM. Google ScholarDigital Library
- R. Cissée and S. Albayrak. An agent-based approach for privacy-preserving recommender systems. In Proceedings of the 6th International Joint Conference on Autonomous agents and Multiagent Systems, pages 1--8. ACM, 2007. Google ScholarDigital Library
- N. Dwyer. Traces of digital trust: an interactive design perspective. PhD thesis, Victoria University, 2011.Google Scholar
- N. Dwyer, A. Basu, and S. Marsh. Reflections on measuring the trust empowerment potential of a digital environment. In Proceedings of the IFIP WG11.11 International Conference on Trust Management (IFIPTM), Malaga, Spain, 2013.Google ScholarCross Ref
- S. Fleming. An ant-inspired, deniable routing approach in ad hoc question & answer networks. PhD thesis, University of Sussex, 2012.Google Scholar
- S. Fleming, D. Chalmers, and I. Wakeman. A deniable and efficient question and answer service over ad hoc social networks. Information retrieval, 15(3-4):296--331, 2012. Google ScholarDigital Library
- J. Golbeck. Generating predictive movie recommendations from trust in social networks. In Proceedings of the 4th International Conference on Trust Management (iTrust), Pisa, Italy. Springer, 2006. Google ScholarDigital Library
- J. A. Golbeck. Computing and applying trust in web-based social networks. PhD thesis, University of Maryland, College Park, MD, USA, 2005. AAI3178583. Google ScholarDigital Library
- S. Gong. Privacy-preserving collaborative filtering based on randomized perturbation techniques and secure multiparty computation. IJACT: International Journal of Advancements in Computing Technology, 3(4), 2011.Google Scholar
- G. Guo, J. Zhang, and D. Thalmann. A simple but effective method to incorporate trusted neighbors in recommender systems. In Proceedings of the 20th International Conference on User Modeling, Adaptation, and Personalization (UMAP), pages 114--125. Springer, 2012. Google ScholarDigital Library
- J. Herlocker, J. Konstan, A. Borchers, and J. Riedl. An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 1999. Google ScholarDigital Library
- T. R. Hoens, M. Blanton, and N. V. Chawla. Reliable medical recommendation systems with patient privacy. In Proceedings of the 1st ACM International Health Informatics Symposium, pages 173--182. ACM, 2010. Google ScholarDigital Library
- R. Ismail, C. Boyd, A. Jøsang, and S. Russel. Strong privacy in reputation systems. In Proceedings of the 4th International Workshop on Information Security Applications (WISA), 2003.Google Scholar
- M. Jamali and M. Ester. Trustwalker: a random walk model for combining trust-based and item-based recommendation. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 397--406. ACM, 2009. Google ScholarDigital Library
- M. Jamali and M. Ester. A matrix factorization technique with trust propagation for recommendation in social networks. In Proceedings of the fourth ACM conference on Recommender systems, RecSys '10, pages 135--142, New York, NY, USA, 2010. ACM. Google ScholarDigital Library
- A. Jøsang, T. Ažderska, and S. Marsh. Trust transitivity and conditional belief reasoning. In Trust Management VI, pages 68--83. Springer, 2012.Google ScholarCross Ref
- D. R. Karger, S. Oh, and D. Shah. Budget-optimal crowdsourcing using low-rank matrix approximations. In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages 284--291. IEEE, 2011.Google ScholarCross Ref
- R. Kern, H. Thies, and G. Satzger. Statistical quality control for human-based electronic services. In Service-Oriented Computing, pages 243--257. Springer, 2010.Google ScholarCross Ref
- R. Likert. A technique for the measurement of attitudes. Archives of psychology, 1932.Google Scholar
- S. Marsh and M. R. Dibben. Trust, untrust, distrust and mistrust -- an exploration of the dark(er) side. In Trust Management, pages 17--33. Springer, 2005. Google ScholarDigital Library
- P. Massa and P. Avesani. Trust-aware recommender systems. In Proceedings of the 2007 ACM conference on Recommender systems, RecSys '07, pages 17--24, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- T. Muller and P. Schweitzer. On beta models with trust chains. In Trust Management VII, pages 49--65. Springer, 2013.Google ScholarCross Ref
- J. O'Donovan and B. Smyth. Trust in recommender systems. In Proceedings of the 10th international conference on Intelligent user interfaces, pages 167--174. ACM, 2005. Google ScholarDigital Library
- P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology -- EUROCRYPT'99, volume 1592, pages 223--238. Springer, 1999. Google ScholarDigital Library
- D. C. Parkes, M. O. Rabin, S. M. Shieber, and C. Thorpe. Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Research and Applications, 7(3):294--312, 2008. Google ScholarDigital Library
- H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In Data Mining, 2003. ICDM 2003. Third IEEE International Conference on, pages 625--628. IEEE, 2003. Google ScholarDigital Library
- H. Polat and W. Du. Privacy-preserving collaborative filtering on vertically partitioned data. Knowledge Discovery in Databases: PKDD 2005, pages 651--658, 2005. Google ScholarDigital Library
- H. Polat and W. Du. Achieving private recommendations using randomized response techniques. Advances in Knowledge Discovery and Data Mining, pages 637--646, 2006. Google ScholarDigital Library
- L. R. Varshney. Privacy and reliability in crowdsourcing service delivery. In SRII Global Conference (SRII), 2012 Annual, pages 55--60. IEEE, 2012. Google ScholarDigital Library
- Y. Wang, Y. Huang, and C. Louis. Respecting user privacy in mobile crowdsourcing. SCIENCE, 2(2):pp-50, 2013.Google Scholar
Index Terms
- Opinions of people: factoring in privacy and trust
Recommendations
The Role of Trust and Technology Acceptance ModelTAM on Customer Acceptance of Mobile Banking: An Integrated Model to Improve Mobile Banking in Banking Sector-A Conceptual Paper
This paper studies the need to integrate trust and Technology acceptance model TAM to understand the behaviour intention of the customer to use mobile banking. The present study focuses through literature review on trust related antecedents and ...
Privacy preserving trusted social feedback
SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied ComputingWith the growth of social networks, recommender systems have taken advantage of the social network graph structures to provide better recommendation. In this paper, we propose a privacy preserving trusted social feedback (TSF) system, in which users ...
A matrix factorization technique with trust propagation for recommendation in social networks
RecSys '10: Proceedings of the fourth ACM conference on Recommender systemsRecommender systems are becoming tools of choice to select the online information relevant to a given user. Collaborative filtering is the most popular approach to building recommender systems and has been successfully employed in many applications. ...
Comments