Skip to main navigation Skip to search Skip to main content

Privacy-Preserving Social Recommendation: Privacy Leakage and Countermeasure

  • Yuyue Chen
  • , Peng Yang
  • , Zoe Lin Jiang*
  • , Wenhao Wu
  • , Junbin Fang
  • , Xuan Wang
  • , Chuanyi Liu
  • *Corresponding author for this work
  • Harbin Institute of Technology Shenzhen
  • The University of Hong Kong
  • Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies
  • Jinan University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Social recommendation systems generally utilize two types of data, user-item interaction matrices (R) from rating platform (P0), and user-user social graphs (S) from social platform (P1). Considering user privacy that neither R nor S can be directly shared, Chen et al. introduced the Secure Social Recommendation (SeSoRec) framework with the Secret Sharing-based Matrix Multiplication (SSMM) protocol. However, we find that the leakage of intermeidate information introduced by SSMM will eventually lead to the leakage of S to P0, which challenges the privacy guarantees of SeSoRec.This work firstly identifies that the claimed "innocuous"leakage in SeSoRec originates from reusing the same One-Time Pad key during two randomization phases in SSMM, with formal proof that SSMM violates semi-honest security. Secondly, this work proposes the Two-Time Pad Attack with two reconstruction algorithms to evaluate the severity of the leakage. The Two-Time Pad Attack can extract the column-wise sum of matrices and , and the row-wise difference of matrices and , where such matrices are closely related to R or S. The Sparse Matrix Reconstruction (SMR) algorithm can achieve 99.35%, 83.83%, and 77.14% reconstruction rates for non-zero entries in S on FilmTrust, Epinions, and Douban datasets, respectively. The Grayscale Image Reconstruction (GIR) algorithm can successfully recover MNIST image contours. Thirdly, when the number of columns/rows of the input matrix A/B in SSMM is odd (requiring zero-padding to an even dimension), this work proposes the Zero-Padding Attack which can directly expose the last column/row of A/B. Finally, this work proposes the Privacy-Preserving Matrix Multiplication (PPMM) protocol with experimental demonstration as a replacement for SSMM, which eliminates such leakage while maintaining efficiency.

Original languageEnglish
Title of host publicationRecSys2025 - Proceedings of the 19th ACM Conference on Recommender Systems
PublisherAssociation for Computing Machinery, Inc
Pages391-400
Number of pages10
ISBN (Electronic)9798400713644
DOIs
StatePublished - 7 Aug 2025
Externally publishedYes
Event19th ACM Conference on Recommender Systems, RecSys 2025 - Prague, Czech Republic
Duration: 22 Sep 202526 Sep 2025

Publication series

NameRecSys2025 - Proceedings of the 19th ACM Conference on Recommender Systems

Conference

Conference19th ACM Conference on Recommender Systems, RecSys 2025
Country/TerritoryCzech Republic
CityPrague
Period22/09/2526/09/25

Keywords

  • Privacy-Preserving Social Recommendation
  • Secret Sharing
  • Social Recommendation Systems

Fingerprint

Dive into the research topics of 'Privacy-Preserving Social Recommendation: Privacy Leakage and Countermeasure'. Together they form a unique fingerprint.

Cite this