Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (2): 70-80.doi: 10.11959/j.issn.2096-109x.2023022
• Papers • Previous Articles Next Articles
Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG
Revised:
2023-02-21
Online:
2023-04-25
Published:
2023-04-01
Supported by:
CLC Number:
Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80.
"
上传比例 | MD = 2.5% | MD = 5.0% | MD = 7.5% | MD = 10.0% | |||||||
MAE/RMSE | MSE | MAE/RMSE | MSE | MAE/RMSE | MSE | MAE/RMSE | MSE | ||||
1 | 0.634/1.609 | 0.000 1 | 0.550/1.40 | 0.000 1 | 0.512/1.301 | 0.000 1 | 0.500/1.290 | 0.002 | |||
0.1 | 0.650/1.633 | 0.000 5 | 0.577/1.422 | 0.001 | 0.520/1.296 | 0.002 | 0.504/1.278 | 0.124 | |||
0.01 | 0.694/1.723 | 0.090 | 0.615/1.477 | 0.712 | 0.531/1.302 | 2.806 | 0.532/1.280 | 2.067 | |||
0.001 | 0.835/1.948 | 6.402 | 0.715/1.621 | 9.556 | 0.650/1.406 | 14.052 | 0.650/1.396 | 14.185 |
"
重写比例 | MD = 2.5% | MD = 5.0% | MD = 7.5% | MD = 10.0% | |||||||
MAE/RMSE | MSE | MAE/RMSE | MSE | MAE/RMSE | MSE | MAE/RMSE | MSE | ||||
1 | 0.650/1.633 | 0.000 5 | 0.577/1.422 | 0.001 | 0.520/1.296 | 0.002 | 0.504/1.278 | 0.124 | |||
0.5 | 0.652/1.642 | 0.043 | 0.573/1.414 | 0.193 | 0.528/1.322 | 0.095 | 0.500/1.265 | 0.426 | |||
0.1 | 0.654/1.660 | 1.847 | 0.588/1.454 | 3.757 | 0.536/1.332 | 1.271 | 0.515/1.281 | 1.660 | |||
0.05 | 0.672/1.679 | 4.393 | 0.630/1.549 | 7.454 | 0.594/1.432 | 5.146 | 0.586/1.335 | 2.615 |
"
上传比例 | θ o=1 | θ o=0.5 | θ o=0.1 | θo=0.05 | |||||||
MAE/RMSE | MSE | MAE/RMSE | MSE | MAE/RMSE | MSE | MAE/RMSE | MSE | ||||
1 | 0.500/1.290 | 0.002 | 0.496/1.275 | 0.071 | 0.507/1.278 | 0.682 | 0.564/1.320 | 2.761 | |||
0.1 | 0.504/1.278 | 0.124 | 0.500/1.265 | 0.426 | 0.515/1.281 | 1.660 | 0.586/1.335 | 2.615 | |||
0.01 | 0.532/1.280 | 2.067 | 0.539/1.267 | 2.810 | 0.556/1.304 | 9.929 | 0.583/1.346 | 8.294 | |||
0.001 | 0.650/1.396 | 14.185 | 0.654/1.373 | 13.553 | 0.647/1.376 | 16.118 | 0.689/1.490 | 27.348 |
[1] | ZHU J , HE P , ZHENG Z ,et al. A privacy-preserving qos prediction framework for web service recommendation[C]// Proceedings of 2015 IEEE International Conference on Web Services. 2015: 241-248. |
[2] | CHEN Z , SUN Y , YOU D ,et al. An accurate and efficient web service QoS prediction model with wide-range awareness[J]. Future Generation Computer Systems, 2020,109: 275-292. |
[3] | ZHANG Y , PAN J , QI L ,et al. Privacy-preserving quality prediction for edge-based IoT services[J]. Future Generation Computer Systems, 2021,114: 336-348. |
[4] | LIU J , CHEN Y . A personalized clustering-based and reliable trust-aware QoS prediction approach for cloud service recommendation in cloud manufacturing[J]. Knowledge-Based Systems, 2019,174: 43-56. |
[5] | WU D , HE Q , LUO X ,et al. A posterior-neighborhood-regularized latent factor model for highly accurate web service QoS prediction[J]. IEEE Transactions on Services Computing, 2019. |
[6] | YANG Y , ZHENG Z , NIU X ,et al. A location-based factorization machine model for Web service QoS prediction[J]. IEEE Transactions on Services Computing, 2018,14(5): 1264-1277. |
[7] | LI J , WANG J , SUN Q ,et al. Temporal influences-aware collaborative filtering for QoS-based service recommendation[C]// Proceedings of 2017 IEEE International Conference on Services Computing (SCC). 2017: 471-474. |
[8] | WU H , YUE K , LI B ,et al. Collaborative QoS prediction with context-sensitive matrix factorization[J]. Future Generation Computer Systems, 2018,82: 669-678. |
[9] | CHEN C , LIU Z , ZHAO P ,et al. Privacy preserving point-of-interest recommendation using decentralized matrix factorization[C]// Proceedings of the AAAI Conference on Artificial Intelligence. 2018,32(1). |
[10] | 牛犇, 李凤华, 华佳烽 ,等. 移动网络中场景关联的隐私保护机制研究[J]. 网络与信息安全学报, 2015,1(1): 31-42. |
NIU B , LI F H , HUA J F ,et al. Research on scenario-based mechanism in privacy-aware mobile networks[J]. Chinese Journal of Network and Information Security. 2015,1(1): 31-42. | |
[11] | VOIGT P , VON DEM BUSSCHE A . The eu general data protection regulation (gdpr)[M]. A Practical Guide (1st Ed). Cham: Springer International Publishing, 2017(3152676):10.5555. |
[12] | SHAO L , ZHANG J , WEI Y ,et al. Personalized QoS prediction forweb services via collaborative filtering[C]// Proceedings of IEEE International Conference on Web Services (ICWS 2007). 2007: 439-446. |
[13] | SARWAR B , KARYPIS G , KONSTAN J ,et al. Item-based collaborative filtering recommendation algorithms[C]// Proceedings of the 10th international conference on World Wide Web. 2001: 285-295. |
[14] | ZHENG Z , MA H , LYU M R ,et al. QoS-aware web service recommendation by collaborative filtering[J]. IEEE Transactions on services computing, 2010,4(2): 140-152. |
[15] | ZHENG Z , MA H , LYU M R ,et al. Collaborative web service QoS prediction via neighborhood integrated matrix factorization[J]. IEEE Transactions on Services Computing, 2012,6(3): 289-299. |
[16] | ZHANG Y , ZHANG X , ZHANG P ,et al. Credible and online qos prediction for services in unreliable cloud environment[C]// Proceedings of 2020 IEEE International Conference on Services Computing (SCC). 2020: 272-279. |
[17] | ZHU X , JING X Y , WU D ,et al. Similarity-maintaining privacy preservation and location-aware low-rank matrix factorization for QoS prediction based web service recommendation[J]. IEEE Transactions on Services Computing, 2018. |
[18] | 张鹏程, 金惠颖 . 一种移动边缘环境下面向隐私保护 QoS 预测方法[J]. 计算机学报, 2020,43(8): 1555-1571. |
ZHANG P C , JIN H Y . A forward privacy-preserving QoS prediction method for mobile edge environments[J]. Chinese Journal of Computers. 2020,43(8): 1555-1571. | |
[19] | BADSHA S , YI X , KHALIL I ,et al. Privacy preserving location-aware personalized web service recommendations[J]. IEEE Transactions on Services Computing, 2018. |
[20] | BADSHA S , YI X , KHALIL I ,et al. Privacy preserving user based web service recommendations[J]. IEEE Access, 2018,6: 56647-56657. |
[21] | RAHMAN M S , KHALIL I , ALABDULATIF A ,et al. Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform[J]. Knowledge-Based Systems, 2019,180: 104-115. |
[22] | ZHANG S , LIU Q , LIN Y . Anonymizing popularity in online social networks with full utility[J]. Future Generation Computer Systems, 2017,72: 227-238. |
[23] | QI L , ZHANG X , LI S ,et al. Spatial-temporal data-driven service recommendation with privacy-preservation[J]. Information Sciences, 2020,515: 91-102. |
[24] | ZHANG Y , ZHANG P , LUO Y ,et al. Efficient and privacy-preserving federated QoS prediction for cloud services[C]// Proceedings of 2020 IEEE International Conference on Web Services (ICWS). 2020: 549-553. |
[25] | ZHU L , LIU Z , HAN S . Deep leakage from gradients[J]. Advances in Neural Information Processing Systems, 2019,(32). |
[26] | RUDER S . An overview of gradient descent optimization algorithms[J]. arXiv preprint arXiv:1609.04747, 2016. |
[27] | LIU D C. , NOCEDAL J . On the limited memory BFGS method for large scale optimization[J]. Mathematical Programming, 1989,45(1): 503-528. |
[28] | ZHENG Z , ZHANG Y , LYU M R . Investigating QoS of real-world web services[J]. IEEE Transactions on Services Computing, 2012,7(1): 32-39. |
[29] | WEI W , LIU L , LOPER M ,et al. A framework for evaluating gradient leakage attacks in federated learning[J]. arXiv preprint arXiv:2004.10397, 2020. |
[30] | MNIH A , SALAKHUTDINOV R R . Probabilistic matrix factorization[J]. Advances in Neural Information Processing Systems, 2007,20. |
[31] | MCMAHAN B , MPPRE E , RAMAGE D ,et al. Communication-efficient learning of deep networks from decentralized data[C]// Proceedings of Artificial Intelligence and Statistics. 2017: 1273-1282. |
[1] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[2] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[3] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[4] | Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU. Identity-based anonymous cloud auditing scheme with compact tags [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168. |
[5] | Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG. Online medical privacy protection strategy under information value-added mechanism [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177. |
[6] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[7] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[8] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[9] | Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU. Fast handover authentication scheme in 5G mobile edge computing scenarios [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168. |
[10] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[11] | Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE. Survey of federated learning research [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 77-92. |
[12] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[13] | Zhanhui YUAN, Zhi YANG, Hongqi ZHANG, Shuyuan JIN, Xuehui DU. Android complex information flow analysis method based on communicating sequential process [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 156-168. |
[14] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
[15] | Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG. Privacy protection key distribution protocol for edge computing [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 93-100. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|