skip to main content
10.1145/3580305.3599475acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Free access

Privacy Matters: Vertical Federated Linear Contextual Bandits for Privacy Protected Recommendation

Published: 04 August 2023 Publication History

Abstract

Recent awareness of privacy protection and compliance requirement resulted in a controversial view of recommendation system due to personal data usage. Therefore, privacy-protected recommendation emerges as a novel research direction. In this paper, we first formulate this problem as a vertical federated learning problem, i.e., features are vertically distributed over different departments. We study a contextual bandit learning problem for recommendation in the vertical federated setting. To this end, we carefully design a customized encryption scheme named orthogonal matrix-based mask mechanism (O3M). O3M mechanism, a tailored component for contextual bandits by carefully exploiting their shared structure, can ensure privacy protection while avoiding expensive conventional cryptographic techniques. We further apply the mechanism to two commonly-used bandit algorithms, LinUCB and LinTS, and instantiate two practical protocols for online recommendation. The proposed protocols can perfectly recover the service quality of centralized bandit algorithms while achieving a satisfactory runtime efficiency, which is theoretically proved and analysed in this paper. By conducting extensive experiments on both synthetic and real-world datasets, we show the superiority of the proposed method in terms of privacy protection and recommendation performance.

Supplementary Material

MP4 File (rtfp1091-2min-promo.mp4)
We propose O3M, which can be plugged into most of the linear contextual bandits algorithms to achieve the privacy protection utility.

References

[1]
Yasin Abbasi-Yadkori, Dávid Pál, and Csaba Szepesvári. 2011. Improved Algorithms for Linear Stochastic Bandits. In Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, Granada, Spain, John Shawe-Taylor, Richard S. Zemel, Peter L. Bartlett, Fernando C. N. Pereira, and Kilian Q. Weinberger (Eds.). 2312--2320. https://proceedings.neurips.cc/paper/2011/hash/e1d5be1c7f2f456670de3d53c7b54f4a-Abstract.html
[2]
Alekh Agarwal, John Langford, and Chen-Yu Wei. 2020. Federated residual learning. arXiv preprint arXiv:2003.12880 (2020).
[3]
Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In International conference on machine learning. PMLR, 127--135.
[4]
Ghazaleh Beigi, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou, and Huan Liu. 2020. Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning. In WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, Houston, TX, USA, February 3-7, 2020, James Caverlee, Xia (Ben) Hu, Mounia Lalmas, and Wei Wang (Eds.). ACM, 34--42. https://doi.org/10.1145/3336191.3371832
[5]
Di Chai, Leye Wang, Junxue Zhang, Liu Yang, Shuowei Cai, Kai Chen, and Qiang Yang. 2022. Practical Lossless Federated Singular Vector Decomposition over Billion-Scale Data. In KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14 - 18, 2022, Aidong Zhang and Huzefa Rangwala (Eds.). ACM, 46--55. https://doi.org/10.1145/3534678.3539402
[6]
Tianyi Chen, Xiao Jin, Yuejiao Sun, and Wotao Yin. 2020. Vafl: a method of vertical asynchronous federated learning. arXiv preprint arXiv:2007.06081 (2020).
[7]
Yiu-ming Cheung, Juyong Jiang, Feng Yu, and Jian Lou. 2022. Vertical Federated Principal Component Analysis and Its Kernel Extension on Feature-wise Distributed Data. CoRR, Vol. abs/2203.01752 (2022). https://doi.org/10.48550/arXiv.2203.01752 showeprint[arXiv]2203.01752
[8]
Abhimanyu Dubey and Alex 'Sandy' Pentland. 2020. Differentially-Private Federated Linear Bandits. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual, Hugo Larochelle, Marc'Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.). https://proceedings.neurips.cc/paper/2020/hash/4311359ed4969e8401880e3c1836fbe1-Abstract.html
[9]
Cynthia Dwork. 2008. Differential privacy: A survey of results. In International conference on theory and applications of models of computation. Springer, 1--19.
[10]
Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407.
[11]
Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary version, Vol. 78 (1998), 110.
[12]
Yuxuan Han, Zhipeng Liang, Yang Wang, and Jiheng Zhang. 2021. Generalized Linear Bandits with Local Differential Privacy. In Advances in Neural Information Processing Systems, M. Ranzato, A. Beygelzimer, Y. Dauphin, P.S. Liang, and J. Wortman Vaughan (Eds.), Vol. 34. Curran Associates, Inc., 26511--26522. https://proceedings.neurips.cc/paper/2021/file/df0e09d6f25a15a815563df9827f48fa-Paper.pdf
[13]
Awni Y. Hannun, Brian Knott, Shubho Sengupta, and Laurens van der Maaten. 2019. Privacy-Preserving Contextual Bandits. CoRR, Vol. abs/1910.05299 (2019). [arXiv]1910.05299 http://arxiv.org/abs/1910.05299
[14]
Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017).
[15]
Xiangnan He, Hanwang Zhang, Min-Yen Kan, and Tat-Seng Chua. 2017. Fast Matrix Factorization for Online Recommendation with Implicit Feedback. CoRR, Vol. abs/1708.05024 (2017). showeprint[arXiv]1708.05024 http://arxiv.org/abs/1708.05024
[16]
Yaochen Hu, Di Niu, Jianming Yang, and Shengping Zhou. 2019. FDML: A Collaborative Machine Learning Framework for Distributed Features. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2019, Anchorage, AK, USA, August 4-8, 2019, Ankur Teredesai, Vipin Kumar, Ying Li, Rómer Rosales, Evimaria Terzi, and George Karypis (Eds.). ACM, 2232--2240. https://doi.org/10.1145/3292500.3330765
[17]
Ruiquan Huang, Weiqiang Wu, Jing Yang, and Cong Shen. 2021. Federated Linear Contextual Bandits. In Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual, Marc'Aurelio Ranzato, Alina Beygelzimer, Yann N. Dauphin, Percy Liang, and Jennifer Wortman Vaughan (Eds.). 27057--27068. https://proceedings.neurips.cc/paper/2021/hash/e347c51419ffb23ca3fd5050202f9c3d-Abstract.html
[18]
Criteo AI Labs. 2014. https://labs.criteo.com/2014/02/kaggle-display-advertising-challenge-dataset/
[19]
Tor Lattimore and Csaba Szepesvári. 2020. Bandit algorithms. Cambridge University Press.
[20]
Chuanhao Li and Hongning Wang. 2022. Asynchronous Upper Confidence Bound Algorithms for Federated Linear Bandits. In International Conference on Artificial Intelligence and Statistics, AISTATS 2022, 28-30 March 2022, Virtual Event (Proceedings of Machine Learning Research, Vol. 151), Gustau Camps-Valls, Francisco J. R. Ruiz, and Isabel Valera (Eds.). PMLR, 6529--6553. https://proceedings.mlr.press/v151/li22e.html
[21]
Lihong Li, Wei Chu, John Langford, and Robert E. Schapire. 2010. A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, Michael Rappa, Paul Jones, Juliana Freire, and Soumen Chakrabarti (Eds.). ACM, 661--670. https://doi.org/10.1145/1772690.1772758
[22]
Lihong Li, Yu Lu, and Dengyong Zhou. 2017. Provably optimal algorithms for generalized linear contextual bandits. In International Conference on Machine Learning. PMLR, 2071--2080.
[23]
Tan Li, Linqi Song, and Christina Fragouli. 2020. Federated recommendation system via differential privacy. In 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2592--2597.
[24]
Gang Liang and Sudarshan S. Chawathe. 2004. Privacy-Preserving Inter-database Operations. In Intelligence and Security Informatics.
[25]
Blerina Lika, Kostas Kolomvatsos, and Stathes Hadjiefthymiades. 2014. Facing the cold start problem in recommender systems. Expert Syst. Appl., Vol. 41, 4 (2014), 2065--2073. https://doi.org/10.1016/j.eswa.2013.09.005
[26]
Mohammad Malekzadeh, Dimitrios Athanasakis, Hamed Haddadi, and Benjamin Livshits. 2020. Privacy-Preserving Bandits. In Proceedings of Machine Learning and Systems 2020, MLSys 2020, Austin, TX, USA, March 2-4, 2020, Inderjit S. Dhillon, Dimitris S. Papailiopoulos, and Vivienne Sze (Eds.). mlsys.org. https://proceedings.mlsys.org/book/310.pdf
[27]
Erxue Min, Yu Rong, Tingyang Xu, Yatao Bian, Da Luo, Kangyi Lin, Junzhou Huang, Sophia Ananiadou, and Peilin Zhao. 2022. Neighbour interaction based click-through rate prediction via graph-masked transformer. In Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval. 353--362.
[28]
Benny Pinkas, T. Schneider, Gil Segev, and Michael Zohner. 2015. Phasing: Private Set Intersection Using Permutation-based Hashing. In USENIX Security Symposium.
[29]
Zhenghang Ren, Liu Yang, and Kai Chen. 2022. Improving Availability of Vertical Federated Learning: Relaxing Inference on Non-overlapping Data. ACM Trans. Intell. Syst. Technol., Vol. 13, 4 (2022), 58:1--58:20. https://doi.org/10.1145/3501817
[30]
Daniele Romanini, Adam James Hall, Pavlos Papadopoulos, Tom Titcombe, Abbas Ismail, Tudor Cebere, Robert Sandmann, Robin Roehm, and Michael A. Hoeh. 2021. PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN. CoRR, Vol. abs/2104.00489 (2021). showeprint[arXiv]2104.00489 https://arxiv.org/abs/2104.00489
[31]
Yu Rong, Xiao Wen, and Hong Cheng. 2014. A Monte Carlo algorithm for cold start recommendation. In Proceedings of the 23rd international conference on World wide web. 327--336.
[32]
Roshan Shariff and Or Sheffet. 2018. Differentially Private Contextual Linear Bandits. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montréal, Canada, Samy Bengio, Hanna M. Wallach, Hugo Larochelle, Kristen Grauman, Nicolò Cesa-Bianchi, and Roman Garnett (Eds.). 4301--4311. https://proceedings.neurips.cc/paper/2018/hash/a1d7311f2a312426d710e1c617fcbc8c-Abstract.html
[33]
Chengshuai Shi, Cong Shen, and Jing Yang. 2021a. Federated multi-armed bandits with personalization. In International Conference on Artificial Intelligence and Statistics. PMLR, 2917--2925.
[34]
Chengshuai Shi, Cong Shen, and Jing Yang. 2021b. Federated Multi-armed Bandits with Personalization. In The 24th International Conference on Artificial Intelligence and Statistics, AISTATS 2021, April 13-15, 2021, Virtual Event (Proceedings of Machine Learning Research, Vol. 130), Arindam Banerjee and Kenji Fukumizu (Eds.). PMLR, 2917--2925. http://proceedings.mlr.press/v130/shi21c.html
[35]
Aleksandrs Slivkins et al. 2019. Introduction to multi-armed bandits. Foundations and Trends® in Machine Learning, Vol. 12, 1--2 (2019), 1--286.
[36]
Ambuj Tewari and Susan A. Murphy. 2017. From Ads to Interventions: Contextual Bandits in Mobile Health. In Mobile Health - Sensors, Analytic Methods, and Applications, James M. Rehg, Susan A. Murphy, and Santosh Kumar (Eds.). Springer, 495--517. https://doi.org/10.1007/978-3-319-51394-2_25
[37]
Martin J Wainwright. 2019. High-dimensional statistics: A non-asymptotic viewpoint. Vol. 48. Cambridge University Press.
[38]
Kang Wei, Jun Li, Chuan Ma, Ming Ding, Sha Wei, Fan Wu, Guihai Chen, and Thilina Ranbaduge. 2022. Vertical Federated Learning: Challenges, Methodologies and Experiments. CoRR, Vol. abs/2202.04309 (2022). showeprint[arXiv]2202.04309 https://arxiv.org/abs/2202.04309
[39]
Yuncheng Wu, Shaofeng Cai, Xiaokui Xiao, Gang Chen, and Beng Chin Ooi. 2020. Privacy preserving vertical federated learning for tree-based models. arXiv preprint arXiv:2008.06170 (2020).
[40]
Kai Zheng, Tianle Cai, Weiran Huang, Zhenguo Li, and Liwei Wang. 2020. Locally Differentially Private (Contextual) Bandits Learning. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual, Hugo Larochelle, Marc'Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.). https://proceedings.neurips.cc/paper/2020/hash/908c9a564a86426585b29f5335b619bc-Abstract.html
[41]
Zhaowei Zhu, Jingxuan Zhu, Ji Liu, and Yang Liu. 2021. Federated bandit: A gossiping approach. In Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems. 3--4.

Cited By

View all
  • (2024)Enhancing Security and Efficiency: A Lightweight Federated Learning ApproachAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_30(349-359)Online publication date: 9-Apr-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
August 2023
5996 pages
ISBN:9798400701030
DOI:10.1145/3580305
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 August 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. linear contextual bandits
  2. privacy- preserving protocols
  3. vertical federated learning

Qualifiers

  • Research-article

Conference

KDD '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)677
  • Downloads (Last 6 weeks)39
Reflects downloads up to 24 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Security and Efficiency: A Lightweight Federated Learning ApproachAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_30(349-359)Online publication date: 9-Apr-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media