Sie sind auf Seite 1von 4

International Journal of Recent Advancement in Engineering & Research

Volume 2, Issue 9 September -2016

Commendation Generation by Homomorphic Encryption


Tejas Prajapati 1, G.L.Parikh2
Gudlavalleru Engineering Colllege
Abstract The Online prescribed framework empower individual administration to client. We are
concentrating on system that works on security to touchy client information, which can be adjusted
by the administration supplier. This will secure client information by encryption of the information
and executes proposals by the encryption. In this way, the administration supplier watches neither
client inclinations nor proposals. The technique proposed by creator utilizes homomorphic
encryption and secures multi-party calculation, which present a noteworthy overhead in
computational many-sided quality. Creator minimize the presented overhead by securing information
and utilizing cryptographic conventions especially produced for this reason.
I.
INTRODUCTION
From many years, we have experienced phenomenal progress in information and communication
systems. As a result, online applications have become very popular for millions of people.
Personalization is a common approach to attract even more people to web service. The system can
suggest personalized services tailored to a particular user based on his preferences. Since the
personalization of the services offers high profits to the service providers and poses interesting
research challenges, research for generating recommendations, which interests from industry. The
techniques for generating recommendations for users strongly rely on the way personal user
information is gathered. This information can be provided by the user himself as in profiles, or the
service provider can observe users actions like click logs. On one hand, more user information helps
the system to improve the accuracy of the recommendations. On the other hand, the personal
information on the users creates a severe privacy risk since there is no solid guarantee for the service
provider not to misuse the users data. It is often seen that whenever a user login in the system,
service providers statements the ownership of data provided from user and approves itself to allocate
the data to third party. To address the privacy considerations in recommendation systems, in, Canny
proposes a system where the private user data is encrypted and recommendations are generated by
applying an iterative procedure based on the conjugate gradient. This algorithm calculates
characterization of user in subspace. It generates recommendation by computing projections in
encrypted domain. This iterative algorithm takes many rounds for convergence and in each round;
users need to participate in an expensive decryption procedure which is based on a threshold value,
where an important portion of the users is assumed to be online and honest. Private recommendation
system uses elgamel algorithm but system is more complex and inefficient. To overcome this
drawback proposed system uses ElGamal algorithm. This system is efficient to generate private
recommendations in a privacy-preserving manner.
II. LITERATURE SURVEY
As of late, outsourcing vast measure of information in framework and how to deal with the
information raises numerous difficulties to security. The stresses of security will be tended to if
clients encoded the information in the framework. In cryptographic plans, homomorphic framework
permits us to performing calculations on encoded information. The exploration are managing
homomorphic encryption plot for keeping up protection and security in framework by identifying the
mistake brought about while exchanging information utilizing RSA cryptosystem.[2]
By offering customized substance to clients, proposal frameworks have turned into a crucial
instrument in e-business and online media applications. Content based calculation prescribed thing or
item to client that is most like those beforehand acquired. In this paper, creator propose innovative
instruments to secure the protection of people in a suggestion framework. Our proposition depends

15

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 9 September -2016

on homomorphic framework. This is utilized for the saved rating of the clients from the
administration supplier. The client's security regarded by administration suppliers. This is finished by
creating suggestions with scrambled client appraisals, the administration supplier's industrially
significant thing similitudes are ensured against inquisitive elements, thusly. Creator's proposition
investigates straightforward and productive cryptographic strategies to create private suggestions
utilizing a server-customer demonstrate, which neither depends on (trusted) outsiders, nor requires
association with companion. The primary quality of their commitment lies in giving a profoundly
proficient arrangement without turning to impossible suppositions [3].
Suggestion frameworks have ended up critical devices in ecommerce. They join one client's
evaluations of item or administrations with appraisals from different clients to answer questions, for
example, "Would I like X?" with forecasts and recommendations. Clients therefore get unknown
proposals from individuals with comparable tastes. While this procedure appears to be harmless, it
totals client inclinations in routes comparable to measurable database inquiries, which can be
misused to recognize data around a specific client. This is particularly valid for clients with mixed
tastes who rate item crosswise over various sorts or spaces in the frameworks. These straddles
highlight the contention amongst personalization and security in suggestion frameworks. While
straddles empower fortunate suggestion and data about presence might be utilized as a part of
conjunction with other information sources to reveal characters and uncover individual points of
interest. We utilize a diagram theoretic model to think about the advantage from and hazard to
straddles [4].
III. APPROACHES
A Recommendation System now gets to be chief for the general population who need adequate
individual experience to assess the things that are on site. It gives suggestion to particular things, for
example, books, news, tourism administrations and so forth. Personalization is basic term for
enhancing on the web benefits and draws in more clients. The past proposal framework like Amazon,
Suggest, e-sound give recommendation to particular things yet disadvantage that administration
supplier can see the evaluations of clients.
It might happen that proprietor can give more evaluations for specific thing and can expand item
notoriety. This outcomes in misleading to client and protection is abused. In our adaptable proposal
framework clients give evaluations for some item in scrambled configuration, so benefit supplier
does not ready to decode it. In this suggestion framework clients choice time is spared, in light of the
fact that time assumes crucial part in proposal framework. Amid less measure of time client ought to
get more evaluated item.
Documentation and Security Model:
In paper[1], creator consider just the semi fair model where members are thought to be
straightforward yet inquisitive. Along these lines, the protection saving convention they exhibit in
this paper can be demonstrated secure in this model by utilizing existing evidences for the
fundamental building pieces, which it is made out of. Furthermore, in this model they expect that
none of the included gatherings, specifically the administration supplier, the PSP, and the clients,
will conspire. Specifically, they accept that business driven gatherings, the administration supplier,
and the PSP, don't intrigue since such an activity will hurt their business notoriety. They allude
perusers for an examination on the reasonableness of utilizing outsiders.
Homomorphic Encryption:
Various open key cryptosystems are additively Homomorphic, implying that there exists an
operation on figure messages with the end goal that the aftereffect of that operation relates to another
16

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 9 September -2016

figure message whose decoding yields the aggregate of the messages. Given messages and, the
Homomorphic property of an additively cryptosystem with augmentation being the Homomorphic
operation in the scrambled space. Paillier and DGK plan are two additively Cryptosystems utilized.
Paillier cryptosystem is utilized to encode protection delicate information of client. DGK
cryptosystem is utilized for sub-convention. DGK is more proficient as far as encryption and
decoding contrasted with paillier because of it's littler message space of a couple of bits.
Elgamel is semantically secured. This can't recognize the encryptions of known messages and
messages. This accomplished by having numerous conceivable figures for plain content, and picking
haphazardly between these. Semantic security is required as the messages to be encoded in our
proposal framework have low entropy and could somehow or another be recouped by animal drive
speculating.
Community Filtering:
To produce proposals for a specific client in a gathering of N clients and M things, creator utilized a
framework which depends on shared sifting. There are three stages of the framework are utilized:
1.
Similarities are processed between that specific client and every single other client.
2.
The L most comparative clients are chosen by contrasting their closeness values and an edge.
3.
Recommendations on the various things are created as the normal rating of the L most
comparable clients.
IV.
CONCLUSION
From the study of svevral papers, conclusions of different authors we came to know that there are
different methods and various techniques used for generating recommendations. Cryptographic
protocol for generating recommendations based on homomorphic encryption and MPC techniques is
used by author . In particular, author propose to encrypt the privacy sensitive data such as user
preferences and similarity values between users and generate recommendation by processing
encrypted data. While the homomorphic property allows us to realize linear operations in the
encrypted domain, non-linear operations like comparing encrypted values require realizing
cryptographic protocols.

17

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 9 September -2016

REFERENCES
[1]

[2]

[3]
[4]
[5]
[6]
[7]

[8]

[9]
[10]

[11]

[12]
[13]

Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk, Generating Private Recommendations Efficiently using
Homomorphic Encryption and Data Packing, IEEE Transactions on Information Forensics and Security, Vol 7, No. 3, June
2012.
Casino, F. Domingo-Ferrer, J. ; Patsakis, C. ; Puig, D. ; Solanas, A. , Privacy Preserving Collaborative Filtering with kAnonymity through Microaggregation, e-Business Engineering (ICEBE), 2013 IEEE 10th International Conference on 11-13
Sept.
Erkin, M. Beye, T. Veugen, and R. L. Lagendijk, Privacy enhanced recommendation system, in Proc. ThirtyFirst Symp.
Information Theory in the Benelux, Rotterdam, 2010, pp. 3542.
F.McSherry and I. Mironov, Differentially private recommendation systems: Building privacy into the net, in Proc. 15th ACM
SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD09), New York,NY, 2009, pp. 627636, ACM.
H. Polat and W. Du, Privacy-preserving collaborative filtering using randomized perturbation techniques., in Proc. ICDM,
2003, pp. 625628.
Hao Ji, Jinfeng Li, Changrui Ren, Miao He He Hybrid Collaborative Filtering Model for improved Recommendation 2013
IEEE.
J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl, An algorithmic framework for performing collaborative filtering, in
Proc.22nd Ann. Int. ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR99), New York, NY, 1999,
pp. 230237, ACM.
P.Bogetoft, D. L.Christensen, I. Damgrd, M. Geisler, T. P. Jakobsen, M. Krigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J.
Pagter, M. I. Schwartzbach, and T. Toft, Secure multiparty computation goes live, in Proc. Financial Cryptography, 2009, pp.
325343.
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Proc. Advances in Cryptology
(EUROCRYPT 99), ser. LNCS, J. Stern, Ed., May 26, 1999, vol. 1592, pp. 223238, Springer.
R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux, Preserving privacy in collaborative filtering through
distributed aggregation of offline profiles, in Proc. Third ACM Conf. Recommendation Systems (RecSys09), New York, NY,
2009, pp. 157164, ACM.
R. Cramer, I. Damgrd, and J. B. Nielsen, Multipart y computation from threshold homomorphic encryption, in Proc. Int.
Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT01), London, U.K., 2001, pp. 280299, SpringerVerlag.
Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk , Generating Private Recommendations Efficiently Using Homomorphic
Encryption and Data Packing", IEEE Transaction on Information Forensics and Security", Vol. 7,No. 3, JUNE 2012.
Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk, Efficiently computing private recommendations, in Proc. Int. Conf.
Acoustic, Speech and Signal Processing (ICASSP), Prague, Czech Republic,May 2011, , pp. 5864 5867, 2011

18

Das könnte Ihnen auch gefallen