On the User Behavior Leakage from Recommender System Exposure
Modern recommender systems are trained to predict users' potential future interactions from users' historical behavior data. During the interaction process, despite the data coming from the user side, recommender systems also generate exposure data to provide users with personalized recomm...
Main Authors: | , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Association for Computing Machinery
2023
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 03323nam a2200289Ia 4500 | ||
---|---|---|---|
001 | 10.1145-3568954 | ||
008 | 230529s2023 CNT 000 0 und d | ||
020 | |a 10468188 (ISSN) | ||
245 | 1 | 0 | |a On the User Behavior Leakage from Recommender System Exposure |
260 | 0 | |b Association for Computing Machinery |c 2023 | |
856 | |z View Fulltext in Publisher |u https://doi.org/10.1145/3568954 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159625676&doi=10.1145%2f3568954&partnerID=40&md5=189b78946971be13eab57c69ea381a5c | ||
520 | 3 | |a Modern recommender systems are trained to predict users' potential future interactions from users' historical behavior data. During the interaction process, despite the data coming from the user side, recommender systems also generate exposure data to provide users with personalized recommendation slates. Compared with the sparse user behavior data, the system exposure data are much larger in volume since only very few exposed items would be clicked by the user. In addition, user historical behavior data are privacy sensitive and commonly protected with careful access authorization. However, the large volume of recommender exposure data generated by the service provider itself usually receives less attention and could be accessed within a relatively larger scope of various information seekers or even potential adversaries. In this article, we investigate the problem of user behavior data leakage in the field of recommender systems. We show that the privacy-sensitive user past behavior data can be inferred through the modeling of system exposure. In other words, one can infer which items the userhas clicked just from the observation of current systemexposure for this user. Given the fact that system exposure data could be widely accessed from a relatively larger scope, we believe that user past behavior privacy has a high risk of leakage in recommender systems. More precisely, we conduct an attack model whose input is the current recommended item slate (i.e., system exposure) for the user while the output is the user's historical behavior. Specifically, we exploit an encoder-decoder structure to construct the attack model and apply different encoding and decoding strategies to verify attack performance. Experimental results on two real-world datasets indicate a great danger of user behavior data leakage. To address the risk, we propose a two-stage privacy-protection mechanism that first selects a subset of items from the exposure slate and then replaces the selected items with uniform or popularity-based exposure. Experimental evaluation reveals a trade-off effect between the recommendation accuracy and the privacy disclosure risk, which is an interesting and important topic for privacy concerns in recommender systems. © 2023 Association for Computing Machinery. | |
650 | 0 | 4 | |a information security |
650 | 0 | 4 | |a privacy leakage |
650 | 0 | 4 | |a privacy protection |
650 | 0 | 4 | |a Recommender system |
700 | 1 | 0 | |a Chen, Z. |e author |
700 | 1 | 0 | |a Luo, H. |e author |
700 | 1 | 0 | |a Ma, J. |e author |
700 | 1 | 0 | |a Ren, P. |e author |
700 | 1 | 0 | |a Ren, Z. |e author |
700 | 1 | 0 | |a Shi, X. |e author |
700 | 1 | 0 | |a Wang, H. |e author |
700 | 1 | 0 | |a Xin, X. |e author |
700 | 1 | 0 | |a Yang, J. |e author |
773 | |t ACM Transactions on Information Systems |