On the User Behavior Leakage from Recommender System Exposure

Modern recommender systems are trained to predict users' potential future interactions from users' historical behavior data. During the interaction process, despite the data coming from the user side, recommender systems also generate exposure data to provide users with personalized recomm...

Full description

Bibliographic Details
Main Authors: Chen, Z. (Author), Luo, H. (Author), Ma, J. (Author), Ren, P. (Author), Ren, Z. (Author), Shi, X. (Author), Wang, H. (Author), Xin, X. (Author), Yang, J. (Author)
Format: Article
Language:English
Published: Association for Computing Machinery 2023
Subjects:
Online Access:View Fulltext in Publisher
View in Scopus
LEADER 03323nam a2200289Ia 4500
001 10.1145-3568954
008 230529s2023 CNT 000 0 und d
020 |a 10468188 (ISSN) 
245 1 0 |a On the User Behavior Leakage from Recommender System Exposure 
260 0 |b Association for Computing Machinery  |c 2023 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1145/3568954 
856 |z View in Scopus  |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159625676&doi=10.1145%2f3568954&partnerID=40&md5=189b78946971be13eab57c69ea381a5c 
520 3 |a Modern recommender systems are trained to predict users' potential future interactions from users' historical behavior data. During the interaction process, despite the data coming from the user side, recommender systems also generate exposure data to provide users with personalized recommendation slates. Compared with the sparse user behavior data, the system exposure data are much larger in volume since only very few exposed items would be clicked by the user. In addition, user historical behavior data are privacy sensitive and commonly protected with careful access authorization. However, the large volume of recommender exposure data generated by the service provider itself usually receives less attention and could be accessed within a relatively larger scope of various information seekers or even potential adversaries. In this article, we investigate the problem of user behavior data leakage in the field of recommender systems. We show that the privacy-sensitive user past behavior data can be inferred through the modeling of system exposure. In other words, one can infer which items the userhas clicked just from the observation of current systemexposure for this user. Given the fact that system exposure data could be widely accessed from a relatively larger scope, we believe that user past behavior privacy has a high risk of leakage in recommender systems. More precisely, we conduct an attack model whose input is the current recommended item slate (i.e., system exposure) for the user while the output is the user's historical behavior. Specifically, we exploit an encoder-decoder structure to construct the attack model and apply different encoding and decoding strategies to verify attack performance. Experimental results on two real-world datasets indicate a great danger of user behavior data leakage. To address the risk, we propose a two-stage privacy-protection mechanism that first selects a subset of items from the exposure slate and then replaces the selected items with uniform or popularity-based exposure. Experimental evaluation reveals a trade-off effect between the recommendation accuracy and the privacy disclosure risk, which is an interesting and important topic for privacy concerns in recommender systems. © 2023 Association for Computing Machinery. 
650 0 4 |a information security 
650 0 4 |a privacy leakage 
650 0 4 |a privacy protection 
650 0 4 |a Recommender system 
700 1 0 |a Chen, Z.  |e author 
700 1 0 |a Luo, H.  |e author 
700 1 0 |a Ma, J.  |e author 
700 1 0 |a Ren, P.  |e author 
700 1 0 |a Ren, Z.  |e author 
700 1 0 |a Shi, X.  |e author 
700 1 0 |a Wang, H.  |e author 
700 1 0 |a Xin, X.  |e author 
700 1 0 |a Yang, J.  |e author 
773 |t ACM Transactions on Information Systems