Security-Driven hybrid collaborative recommendation method for cloud-based iot services

Shunmei MENG, Zijian GAO, Qianmu LI, Hao WANG, Hong Ning DAI, Lianyong QI*

*Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

2 Citations (Scopus)

Abstract

The rapid development of IoT (Internet of Things) systems and cloud techniques has paved the way for recommender systems to facilitate the daily life of users. However, the accompanying cybersecurity risks, such as environmental attacks and software attacks, must not be ignored. Thus, the security problem in recommender systems becomes a serious challenge for cloud-based IoT services. Moreover, most of existing collaborative recommendation algorithms mainly focus on user-item interaction relationships but seldom consider user-user or item-item co-occurrence relationships, which may affect prediction accuracy. To overcome the above shortcomings, this paper proposes a security-driven hybrid collaborative recommendation method to deal with the large-scale IoT services accessible by clouds in a more scalable and secure manner. Our proposal integrates the factorization-based latent factor model with the neighbor-based collaborative model to mine not only user-service interaction relationships but also user-user and service-service co-occurrence relationships. Moreover, the local sensitive hash (LSH) technique is adopted to speed up the neighbor searching and preserve users’ sensitive information for security concerns based on hash mapping. Finally, experiment results demonstrate that the proposed method can improve prediction accuracy while guaranteeing information security.

Original languageEnglish
Article number101950
JournalComputers and Security
Volume97
Early online date25 Jun 2020
DOIs
Publication statusPublished - Oct 2020
Externally publishedYes

Bibliographical note

Funding Information:
This paper is partially supported by the National Natural Science Foundation of China under Grant No. 61702264, No. 61872219, No. 61761136003, the Fundamental Research Funds for the Central Universities under Grant No. 30918014108, No. 30918012204, the Postdoctoral Science Foundation of China under Grant No. 2019M651835, the Natural Science Foundation of Shandong Province, No.ZR2019MF001, the Open Project of State Key Laboratory for Novel Software Technology under Grant No. KFKT2020B08, the 4th project ?Research on the Key Technology of Endogenous Security Switches? (No. 2020YFB1804604) of the National Key R&D Program ?New Network Equipment Based on Independent Programmable Chips? (No. 2020YFB1804600), and the 2020 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China.

Funding Information:
This paper is partially supported by the National Natural Science Foundation of China under Grant No. 61702264 , No. 61872219 , No. 61761136003 , the Fundamental Research Funds for the Central Universities under Grant No. 30918014108 , No. 30918012204 , the Postdoctoral Science Foundation of China under Grant No. 2019M651835, the Natural Science Foundation of Shandong Province , No. ZR2019MF001 , the Open Project of State Key Laboratory for Novel Software Technology under Grant No. KFKT2020B08, the 4th project “Research on the Key Technology of Endogenous Security Switches” (No. 2020YFB1804604) of the National Key R&D Program “New Network Equipment Based on Independent Programmable Chips” (No. 2020YFB1804600), and the 2020 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China.

Publisher Copyright:
© 2020

Keywords

  • Collaborative recommendation
  • IoT services
  • LSH
  • MF
  • Security

Fingerprint

Dive into the research topics of 'Security-Driven hybrid collaborative recommendation method for cloud-based iot services'. Together they form a unique fingerprint.

Cite this