Privacy Aware Obfuscation Middleware for Mobile Jukebox Recommender Services
نویسندگان
چکیده
Mobile Jukebox is a service offered by mobile operators to their clients, such that subscribers can buy or download anywhere, anytime fulllength music tracks over the 3G Mobile networks. Unlike some music download services, the subscribers can reuse the selected tracks on their music players or computers. As the amount of online music grows rapidly, Jukebox providers employ automatic recommender service as an important tool for music listeners to find music that they will appreciate. On one hand, Jukebox recommender service recommend music based on users’ musical tastes and listening habits which reduces the browsing time for searching new songs and album releases. On the other hand, users care about the privacy of their preferences and individuals’ behaviors regarding the usage of recommender service. This work presents our efforts to design an agent based middle-ware that enables the enduser to use Jukebox recommender services without revealing his sensitive profile information to that service or any third party involved in this process. Our solution relies on a distributed multi-agent architecture involving local agents running on the end-user mobile phone and two stage obfuscation process used to conceal the local profiles of end-users with similar preferences. The first stage is done locally at the end user side but the second stage is done at remote nodes that can be donated by multiple non-colluding end users that requested the recommendations or third parties mash-up service. All the communications between participants are done through anonymised network to hide their network identity. In this paper, we also provide a mobile jukebox network scenario and experimentation results.
منابع مشابه
An Enhanced Middleware for Collaborative Privacy in IPTV Recommender Services
One of the concerns users have to confronted when using IPTV system is information overload that makes it difficult for them to find a suitable content according to their personal preferences. Recommendation service is one of the most widely adopted technologies to alleviating this problem; these services intend to provide people with referrals of items they will appreciate based upon their pre...
متن کاملHolistic Collaborative Privacy Framework for Users' Privacy in Social Recommender Service
Nowadays, it is crucial to preserve the privacy of end-users while utilizing a third-party recommender service within content distribution networks so as to maintain their satisfaction and trust in the offered services. The current business model for those recommender services is centered around the availability of users’ personal data at their side whereas consumers have to trust that the reco...
متن کاملA Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. In this paper, we argue that obfuscation is an important technique for protecting an individual’s location privacy within a pervasive computing environment. The paper sets out a formal framework within which obfuscate...
متن کاملPrivacy-aware location privacy preference recommendations
Location-Based Services have become increasingly popular due to the prevalence of smart devices and location-sharing applications such as Facebook and Foursquare. The protection of people’s sensitive location data in such applications is an important requirement. Conventional location privacy protection methods, however, such as manually defining privacy rules or asking users to make decisions ...
متن کاملProviding Location-Aware Location Privacy Protection for Mobile Location-Based Services
Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constan...
متن کامل