Constructing the mathematical model of a recommender system for decentralized peer-to-peer computer networks

Authors

DOI:

https://doi.org/10.15587/1729-4061.2023.286187

Keywords:

recommender system, decentralized computer network, peer-to-peer network, GERT network, information security

Abstract

Recommender systems make it easier to search with a large amount of content, supplementing or replacing the classic search output with recommendations. In P2P networks, their use can have additional benefits. Because of indexing and search problems, previously added files may not be available to P2P network users. If the user cannot find the file he is looking for, one can provide him with a list of recommendations based on his preferences and search query.

The object of research is the process of creating recommendations for users of decentralized P2P networks to facilitate data search.

The urgent task of increasing the accuracy of mathematical modeling of recommender systems by taking into account the requirements for reliability and data security during changes in the structure of a decentralized P2P network is solved.

An analytical model of the recommender system of a decentralized P2P network has been developed, the main feature of which is taking into account the requirements of reliability and security of recommendation messages. This was done by introducing the following indicators into the general model of the decentralized recommender system – the probability of reliable packet transmission and the probability of safe packet transmission. The developed analytical model makes it possible to conduct a comparative analysis of different methods of operation of recommender systems and to set acceptable parameters under which the degree of relevance does not fall below a certain threshold.

The developed mathematical model of the system based on the GERT scheme differs from the known ones by taking into account the reliability and security requirements during changes in the structure of the decentralized P2P network. This has made it possible to improve the accuracy of simulation results up to 5 %.

The proposed mathematical model could be used for prototyping recommender systems in various fields of activity

Author Biographies

Volodymyr Mikhav, Central Ukrainian National Technical University

Postgraduate Student

Department of Cybersecurity and Software

Serhii Semenov, Pedagogical University of Krakow

Doctor of Technical Sciences, Professor

Institute of Security and Computer Science

Yelyzaveta Meleshko, Central Ukrainian National Technical University

Doctor of Technical Sciences, Professor

Department of Cybersecurity and Software

Mykola Yakymenko, Central Ukrainian National Technical University

PhD, Associate Professor

Department of Higher Mathematics and Physics

Yaroslav Shulika, Central Ukrainian National Technical University

Postgraduate Student

Department of Cybersecurity and Software

References

  1. Fayyaz, Z., Ebrahimian, M., Nawara, D., Ibrahim, A., Kashef, R. (2020). Recommendation Systems: Algorithms, Challenges, Metrics, and Business Opportunities. Applied Sciences, 10 (21), 7748. doi: https://doi.org/10.3390/app10217748
  2. Falk, K. (2019). Practical recommender systems. Manning, 432.
  3. Roy, D., Dutta, M. (2022). A systematic review and research perspective on recommender systems. Journal of Big Data, 9 (1). doi: https://doi.org/10.1186/s40537-022-00592-5
  4. Fulber-Garcia, V. (2023). Centralized Computing vs. Distributed Computing. Baeldung. Available at: https://www.baeldung.com/cs/centralized-vs-distributed-computing
  5. Vergne, J. (2020). Decentralized vs. Distributed Organization: Blockchain, Machine Learning and the Future of the Digital Platform. Organization Theory, 1 (4), 263178772097705. doi: https://doi.org/10.1177/2631787720977052
  6. Kosalka, T. (2006). Decision making through the simulation of centralized and decentralized distribution storage systems. doi: https://doi.org/10.33915/etd.1709
  7. Gong, S., Ye, H., Su, P. (2009). A Peer-to-Peer Based Distributed Collaborative Filtering Architecture. 2009 International Joint Conference on Artificial Intelligence. doi: https://doi.org/10.1109/jcai.2009.154
  8. Karaarslan, E., Konacaklı, E. (2020). Data Storage in the Decentralized World: Blockchain and Derivatives. Who Runs the World: Data, 37–69. doi: https://doi.org/10.26650/b/et06.2020.011.03
  9. Si, M., Li, Q. (2018). Shilling attacks against collaborative recommender systems: a review. Artificial Intelligence Review, 53 (1), 291–319. doi: https://doi.org/10.1007/s10462-018-9655-x
  10. Meleshko, Y., Drieiev, O., Yakymenko, M., Lysytsia, D. (2020). Developing a model of the dynamics of states of a recommendation system under conditions of profile injection attacks. Eastern-European Journal of Enterprise Technologies, 4 (2 (106)), 14–24. doi: https://doi.org/10.15587/1729-4061.2020.209047
  11. Meleshko, Y. V., Yakymenko, M., Semenov, S. (2021). A Method of Detecting Bot Networks Based on Graph Clustering in the Recommendation System of Social Network. Computational Linguistics and Intelligent Systems, 2870. Available at: https://ceur-ws.org/Vol-2870/paper92.pdf
  12. The BitTorrent Protocol Specification (2017). Available at: http://www.bittorrent.org/beps/bep_0003.html
  13. Gnutella Protocol Development (2003). Available at: https://rfc-gnutella.sourceforge.net
  14. Kademlia: A Design Specification (2010). Available at: https://xlattice.sourceforge.net/components/protocol/kademlia/specs.html
  15. Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., Balakrishnan, H. (2001). Chord. ACM SIGCOMM Computer Communication Review, 31 (4), 149–160. doi: https://doi.org/10.1145/964723.383071
  16. Zhang, S., Yin, H., Chen, T., Huang, Z., Nguyen, Q. V. H., Cui, L. (2022). PipAttack: Poisoning Federated Recommender Systems for Manipulating Item Promotion. Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining. doi: https://doi.org/10.1145/3488560.3498386
  17. Mohammed, A. S., Meleshko, Y., Balaji B, S., Serhii, S. (2019). Collaborative Filtering Method with the use of Production Rules. 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). doi: https://doi.org/10.1109/iccike47802.2019.9004257
  18. Ko, H., Lee, S., Park, Y., Choi, A. (2022). A Survey of Recommendation Systems: Recommendation Models, Techniques, and Application Fields. Electronics, 11 (1), 141. doi: https://doi.org/10.3390/electronics11010141
  19. Naeen, H. M., Jalali, M. (2019). A decentralized trust-aware collaborative filtering recommender system based on weighted items for social tagging systems. arXiv. doi: https://doi.org/10.48550/arXiv.1906.05143
  20. Wang, Y., Han, S., Zhou, J., Chen, L., Chen, C. L. P., Zhang, T. et al. (2023). Random Feature-Based Collaborative Kernel Fuzzy Clustering for Distributed Peer-to-Peer Networks. IEEE Transactions on Fuzzy Systems, 31 (2), 692–706. doi: https://doi.org/10.1109/tfuzz.2022.3188363
  21. Wang, T., Wang, M. (2018). Distributed collaborative filtering recommendation algorithm based on DHT. Cluster Computing, 22 (S2), 2931–2941. doi: https://doi.org/10.1007/s10586-018-1699-9
  22. Zhao, Z., Wang, Y., Wang, H. (2021). SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing. Peer-to-Peer Networking and Applications, 14 (6), 3793–3805. doi: https://doi.org/10.1007/s12083-021-01217-z
  23. Lisi, A., De Salve, A., Mori, P., Ricci, L. (2019). A Smart Contract Based Recommender System. Lecture Notes in Computer Science, 29–42. doi: https://doi.org/10.1007/978-3-030-36027-6_3
  24. Bobadilla, D., Lipizzi, C. (2021). A Blockchain-Based Collaborative Filtering Recommendation System Based on Trust. 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). doi: https://doi.org/10.1109/iccwamtip53232.2021.9674128
  25. Badis, L., Amad, M., Aïssani, D., Abbar, S. (2021). P2PCF: A collaborative filtering based recommender system for peer to peer social networks. Journal of High Speed Networks, 27 (1), 13–31. doi: https://doi.org/10.3233/jhs-210649
  26. Yoo, H., Chung, K. (2017). Mining-based lifecare recommendation using peer-to-peer dataset and adaptive decision feedback. Peer-to-Peer Networking and Applications, 11 (6), 1309–1320. doi: https://doi.org/10.1007/s12083-017-0620-2
  27. Zeng, X., Yu, X. (2023). P2P based on network behavior analysis trust value calculation method. International Conference on Computer Network Security and Software Engineering (CNSSE 2023). doi: https://doi.org/10.1117/12.2683177
  28. Semenov, S., Zhang, L., Cao, W., Bulba, S., Babenko, V., Davydov, V. (2021). Development of a fuzzy GERT-model for investigating common software vulnerabilities. Eastern-European Journal of Enterprise Technologies, 6 (2 (114)), 6–18. doi: https://doi.org/10.15587/1729-4061.2021.243715
  29. Semenov, S., Liqiang, Z., Weiling, C., Davydov, V. (2021). Development a mathematical model for the software security testing first stage. Eastern-European Journal of Enterprise Technologies, 3 (2 (111)), 24–34. doi: https://doi.org/10.15587/1729-4061.2021.233417
  30. Netflix Prize data: Dataset from Netflix's competition to improve their reccommendation algorithm. Available at: https://www.kaggle.com/datasets/netflix-inc/netflix-prize-data?resource=download
Constructng the mathematical model of a recommender system for decentralized peer-to-peer computer networks

Downloads

Published

2023-08-31

How to Cite

Mikhav, V., Semenov, S., Meleshko, Y., Yakymenko, M., & Shulika, Y. (2023). Constructing the mathematical model of a recommender system for decentralized peer-to-peer computer networks. Eastern-European Journal of Enterprise Technologies, 4(9 (124), 24–35. https://doi.org/10.15587/1729-4061.2023.286187

Issue

Section

Information and controlling system