EEXCESS or the challenge of privacy-preserving quality - - PowerPoint PPT Presentation

eexcess or the challenge of privacy preserving quality
SMART_READER_LITE
LIVE PREVIEW

EEXCESS or the challenge of privacy-preserving quality - - PowerPoint PPT Presentation

EEXCESS or the challenge of privacy-preserving quality recommendations Benjamin Habegger, Nadia Bennani, Eld Egyed-Szigmond, Omar Hassan Lyon University, CNRS, INSA-Lyon, LIRIS, UMR5205 EEXCESS Project Enhancing Europes eXchange in


slide-1
SLIDE 1

EEXCESS or the challenge of privacy-preserving quality recommendations

Benjamin Habegger, Nadia Bennani, Elöd Egyed-Szigmond, Omar Hassan Lyon University, CNRS, INSA-Lyon, LIRIS, UMR5205

slide-2
SLIDE 2

EEXCESS – Project

Enhancing Europe’s eXchange in Cultural Educational and Scientifjc reSources.

Started: February 2013 Duration: 4 Years Budget: 7.05 Million EUR

http://eexcess.eu/

slide-3
SLIDE 3

EEXCESS – Partners

slide-4
SLIDE 4

EEXCESS – Main problem

4

Making existing qualilty content visible

“Popular” long-tail content Long-tail content ≠ Quality content

slide-5
SLIDE 5

EEXCESS - Objectives

Content enrichment

5

Personalized recommendation Privacy preservation

slide-6
SLIDE 6

EEXCESS – Global challenges

  • Federated recommendation
  • Integration of multiple document sources
  • Mining for user profjles
  • Adapting user interfaces to context
  • Preserving user privacy

6

slide-7
SLIDE 7

EEXCESS – Tradeofg ?

7

Privacy Quality

  • Unlimited disclosure

– User privacy is clearly at stake. – Does it improve quality ? How much ?

slide-8
SLIDE 8

EEXCESS – Tradeofg ?

8

Privacy Quality

  • Limited disclosure

– Limit recommendation quality ?

slide-9
SLIDE 9

EEXCESS – Simplifjed architecture

Usage Mining

EEXCESS

Client Application Mendeley Search Econbiz Search

Privacy Proxy

EEXCESS

Federated Recommender

EEXCESS

9

slide-10
SLIDE 10

Usage mining → build detailed user profjles

slide-11
SLIDE 11

EEXCESS – User context

  • Activity context

– Browsing history – Ongoing tasks – Reading history

  • Environmental context

– Temperature, Humidity,

Light

– Things, Services

  • Personal context

– Weight, Pulse, Blood

pressure, Mood

11

  • Social context

– Friends – Neighbors – Co-workers – Relatives

  • Spatio-temporal context

– Time – Location – Direction of movement

slide-12
SLIDE 12

EEXCESS – User profjle

  • Demographic information

– Age – Gender – Relationship status – Address – ...

  • Interests

– Professional interests – Personal interests – Interest in commercial

products

12

  • Knowledge, background, skills

– Knoweldge within a domain

(e.g. acquired by a student)

– Professional expertise and

skills

  • Goals

– Short term goal (current task) – Long term goal

  • Behavior

– Repetitive behaviors – History of user actions

slide-13
SLIDE 13

Recommendation → fjnd recommendations adapted to the user profjles

slide-14
SLIDE 14

EEXCESS – Recommendation

  • Content-based
  • Collaborative fjltering
  • Demographic fjltering
  • ...

14

slide-15
SLIDE 15

Privacy preserving recommendation → compromise between private information disclosure and quality

slide-16
SLIDE 16

EEXCESS – Privacy questions

  • What profjle information is useful ?

– For usage mining ? – For quality recommendations ?

  • How much and how detailed should this information

be disclosed ?

– To preserve privacy ? – To ensure recommendation quality ?

  • What control and feedback can we provide ?

– To „measure“ the impacts of disclosure

16

slide-17
SLIDE 17

EEXCESS – Privacy wish-list

  • Guarantees

– Deterministic ?

  • Guarantee that a particular piece of information doesn't leak

– Risk of disclosure (including inference)

  • Measuring risks and impacts of privacy breaches
  • Flexibility

– User-dependant policy

  • Alice and Bob may have difgerent requirements

– Context-dependant policy

  • Alice may have difgerent requirements at home and at work

17

slide-18
SLIDE 18

EEXCESS – Privacy techniques

  • Anonymization

– K-anonymity [Sweeney2002]

  • Difgerential Privacy [Dwork2006]
  • Hiding in the crowd
  • Distributed recommendation
  • ...

18

slide-19
SLIDE 19

EEXCESS – Privacy challenges

  • Data mining, Big data analytics
  • External knowledge

– De-anonymization [Narayanan2008] – Breaches w.o. participation

[Dwork2006]

19

slide-20
SLIDE 20

EEXCESS – Privacy challenges

20

D

...

Paul

What is the average age ?

38 Paul is 2 years less than the average person in D

Privacy breach w.o. participation [Dwork2006]

36

slide-21
SLIDE 21

Ongoing work

slide-22
SLIDE 22

EEXCESS – Current focus

  • Setup a test-framework

– User interface – API's – Evaluation tools

  • Involve the user

– Transparency

  • What is going on ?
  • What does the system know ?

– Control

  • Let users defjne their own policy

– Feedback

  • Show the impacts of user's policy

22

slide-23
SLIDE 23

EEXCESS – Simplifjed architecture

Usage Mining

EEXCESS

Client Application Mendeley Search Econbiz Search

Privacy Proxy

EEXCESS

Federated Recommender

EEXCESS

23

slide-24
SLIDE 24

Privacy Plugin – Recommendations

24

slide-25
SLIDE 25

Privacy Plugin – Profjle edition

25

slide-26
SLIDE 26

Privacy Plugin – Profjle data collection

26

  • Mendely auth + profjle import
slide-27
SLIDE 27

Privacy Proxy

EEXCES S

Privacy Plugin

27

Usage Mining

EEXCES S

Mendeley Search Econbiz Search Federated Recommender

EEXCES S

  • Receives

recommendations

  • User profjle edits
  • User browsing activity
  • Recommendation requests

Client Application

  • Oauth interactions with

Mendeley

  • Recommendations
  • Privacy settings
  • Profjle editing
  • Privacy sandbox
slide-28
SLIDE 28

Privacy Plugin - Transparency

28

slide-29
SLIDE 29

Privacy Plugin – Trancparency

29

slide-30
SLIDE 30

Privacy Plugin – Control & Feedback

30

slide-31
SLIDE 31

Privacy Plugin – Control & Feedback

31

slide-32
SLIDE 32

Privacy Proxy - Protection

32

Usage Mining

EEXCES S

Client Application Mendeley Search Econbiz Search Federated Recommender

EEXCES S

Privacy Proxy

EEXCES S

  • Receives

recommendations

  • Relays

recommendations

  • User profjle edits
  • User browsing activity
  • Recommendation requests
  • Stores profjles + browsing activity
  • Applies privacy settings
  • Relays policy-respectful

recommendation requests

slide-33
SLIDE 33

33

Usage Mining

EEXCES S

Client Application Mendeley Search Econbiz Search

Privacy Proxy

EEXCES S

  • Returns interleaved

recommendations

  • Searches Econbiz

+ Mendeley

  • Receives

recommendation requests

Federated Recommender

EEXCES S

Basic Federated Recommender

  • Receives recommendation request
  • User static profjle
  • User recent activity
  • Maps “user context” into a

weighted term-based query

slide-34
SLIDE 34

EEXCESS – Summary

  • Quality

– Recommendations adapted to the user

  • Preserving privacy

– Guaranteeing respect of privacy policy

  • Scalability

– Ensuring the whole system scales

  • Quantifjable measures

34

slide-35
SLIDE 35

EEXCESS – Future work

  • Privacy-preserving search
  • Measuring

– recommendation quality – privacy impacts of disclosure

  • Impacts of trustworthiness in peers

35

slide-36
SLIDE 36

Contact

@b_habegger http://www.linkedin.com/in/benjaminhabegger benjamin.habegger@insa-lyon.fr