SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7153
Personalised privacy-preserving social recommendation Based on
Ranking systems
G.Bindhu Harshitha1, J. Priyanka2, A.Pravallika3 , A.Jasmine Gilda4
1 Computer Science and Engineering Dept of RMK Engineering College
2 Computer Science and Engineering Dept of RMK Engineering College
3Computer Science and Engineering Dept of RMK Engineering College
4Associate Professor, Computer Science and Engineering Dept of RMK Engineering College,Tamil Nadu,Chennai
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Personalized recommendationiscrucial tohelp
the users find pertinent information as the user requested
but in this paper we need to obfuscate the users data
without being socialized ,where a user has both their public
data and private data .Some of the users would prefer to
publish their private data where some of them would refuse
to so in order to overcome this issue we have proposed
PrivRank, a customizable and continues privacy preserving
social media data publishing frame work protecting users
against inference attacks while enabling personalized
ranking-based recommendations,whileenablingtheprivacy
preserving we will not be allowing an 3rd party user to know
the users information. This helps the user’s data to be
protected and obfuscate it. The frame work helps the user
get the information correctly as requested in a trusted way.
Our frame work can efficiently provide effective and
continues protection of user-specified private data, while
still preserving the utility of the obfuscated data for
personalizedranking-based recommendation,in whichusers
can model ratings and social relationships privately The
social Recommendation with least privacy leakage to un-
trusted recommender and other users (i.e., friends) is an
important yet Challenging problem.
Key Words: Privacy-preserving data publishing,
customized privacy protection, personalization, ranking-
based recommendation, Social media, location based
social networks.
1.INTRODUCTION
The recommender system has become an important
component on this online platform. With increasingofsocial
networks, recommender systems can take advantage of
these social relationships to furtherimproveeffectiveness of
recommendation Despite their effectiveness, these social
relationship-based recommender systems (i.e., social
recommendation), may introduce another source of privacy
leakage. For example, by observing a users’ ratings on
products such as adult or medical items, the attacker may
infer the users private information. In practice, privacy-
preserving social recommender systems, which can provide
an accurate recommendation results without sacrificing
users’ privacy, is very necessary. The major issue faced by
the user is leakage of their private information when ever
recommended or posted. First, a vast majority of existing
efforts heavily depend on an assumption that the
recommender is fully trusted network and start to use it.
They neglect the fact that the recommenderitselfmaybeun-
trusted and produce malicious behaviours, causing serious
privacy leakage. Second, some other works rely on
cryptography to prevent users’ exact inputs from being
leaked to the un-trusted recommender. Moreover, it has
been shown that attackers can still infer sensitive
information from the user based by their influence on the
final results. Third, some of the existing works rely on
friend’s history ratings to make recommendations. Social
media sites such as IMDB and Facebook allow users to
specify the visibility of their ratings on products. Treating
equally all the sensitive ratings and thus not exposing any
non-sensitive ratings will make it difficult to attract
common-interest friends and make effective
recommendations, sacrificing user experience in the long
run. Our work actually allows to disclosingthenon-sensitive
rating, but prevents sensitive ratingsfrombeingleakedfrom
the exposed non-sensitive ratings. Resolving all the above
mentioned defects is necessary for building an effective
privacy-preserving social recommender
system, which is a very challenging task due to the following
reasons: First, to eliminate the assumption that a
recommender is fully trustful, we need to change the
recommender system to a semi-centralized manner from a
fully centralized. In other words, instead of fully relying on
the Challenging, we now allow users and the recommender
to collaborate together in the course of recommendation.
Specifically, users can take part in publishing their own
ratings, while the recommender canonlyhave accesstonon-
sensitive(public data) ratings, and both partiesinteractwith
each other to make the final recommendation. Second,isthat
when a user unknowingly collaborates with the 3rd part
users then their historical data and their futuredata canalso
be known to the 3rd part users, the second challenge is to
continuously preserve the user data stream withoutleakage
of their data. Third issue noticed is on the ranking based
recommendation where the user recommends to get their
data , here it is being adopted b man of the users to get the
higher ranking output, so when the data is obfuscated
ranking loss is occurred not in all cases but to overcome this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7154
loss it requires high cost, the third challenge is to efficiently
bound the ranking –loss when the data is obfuscated.
1.1 Historical data publishing
When a user subscribes to a third-party service for the first
time, the service provider has access to the user’s entire
historical public data to obfuscate the user’s historical data,
we minimize the privacy leakage from her historical data by
obfuscating her data using data from another user whose
historical data is similar but with less privacy leakage.
1.2 Online data publishing
After the user subscribed to third-party services, the service
provider also has real-time access to her future public data
stream. Due to efficiency considerations, online data
publishing should be performed based on incoming data
instances only (e.g., a rating/tagging/checking-in activity on
an item), without accessing the user’s historical data.
Therefore, we minimize the privacy leakage from individual
activity data instance by obfuscatingthedata streamon-the-
fly.
2. RELATED WORK
To protect and continuously provide privacy to the user
published data the existing systemdependsonsomepolicies
where even it cannot guaranty that the storedandpublished
user data can be protected from malicious attackers. So, the
key idea is to mainly obfuscate the data when published data
remains useful for some application scenarios while the
individual’s privacy is preserved.
According to the issues occurs they are categorized into 2
types:
Fig -1: System workflow for privacy-preserving publishing of
social media data: 1) Users report their activity (i.e.,publicdata)on
social media services; 2) PrivRank publishes the obfuscated public
data to third-party service providers; and 3)thethird-partyservice
providers can still deliver high-quality personalizedranking-based
recommendation to user
The first category is based on heuristic techniquestoprotect
the ad-hoc defined user privacy. Specific solutions mainly
tackle the privacy threat when attackers are able to link the
data user’s identity to a record based on the published data.
For example, to protect user privacy from identity
disclosure, K-anonymity obfuscates the produced data so
that each record cannot be distinguished from at least k-1
other records. However, since these techniquesusuallyhave
ad-hoc privacy definitions, they have been proventobenon-
universal and can only be successful against limited
adversaries. The second category focuses on the
uninformative principle, i.e., on the fact that the published
data should provide attackers with as little additional
information as possible beyond background knowledge
provided.
Differential privacy is a well-known technique that is
known to guarantee user privacy against attackers with
unknown background knowledge. They try to quantitatively
measure privacy leakage based on various entropy-based
metrics such as conditional entropy and mutual information
and to design privacy protectionmechanismsbasedonthose
measures. Although the idea of differential privacyisstricter
(i.e., against attackers with arbitrary background
knowledge) than that of information-theoretic approaches.
Where, information theory can provide informative
guidelines to quantitatively measure the amount of a user’s
private information that an adversary can know by
observing and analyzing the user’s public data
(i.e., the privacy leakage of private data from public data).
In this case stud we support the information-theoretic
approach. The privacy leakage of private data from the
published public data, this is minimized by obfuscating the
users data In the current literature, theobfuscationmethods
mainly ensures data utility by bounding the data
distortion using metrics such as Euclidean distance ,
Squared L2 distance , Hamming distance or Jensen-
Shannon distance. They are similar to limiting the loss
of predicting user ratings on items, where the goal is to
minimize the overall difference (e.g., mean absolute error)
between the predicted and the real ratings from the users.
Therefore minimizing such a rating prediction error is
widely adopted by the research community, ranking-based
(or top-N) recommendation is more practical and is actually
adopted by many of the e-commercial platforms.Specifically,
different from rating prediction that tries to infer the user
rating information, where as ranking-based
recommendation show the mostly liked pages to appear on
the top, we argue that the bounding of data of ranking based
is occurred due to obfuscation where it shows the wrong
data rather than the correct produced ranking data in order
to dissolve this we use Kendall- t method to overcome this
issue to provide the actual data to the user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7155
3. PRELIMINARIES
In the figure shown above about the cycle how PrivRank is
made used to protect the user’s from attackers. All theuser’s
wishes for a secure search recommendation issue occurs
when
1. When a user actually shares their data such as
(tagging, commenting, ratings) in social media with
anyone else.
2. When the subscribe to an 3rd part users their data
gets attacked, Which makes the attacker to use the
historical a well as the future data of the particular
user. Eg: when a person goes to a movie along with
their friends the tag them and make their location
available to all the social friends, and the rate the
movie according to their wish but the personal data
i.e their private data such as their name location
must be kept secured in order to prevent this we
make use of PrivRank. When a user unknowingly
make use of the 3rd party user’s we obfuscate the
data to avoid inference attacksorleakageproblems,
instead the 3rd part can act as a privacy protected
recommender including high raking- based system.
Our system workflow is beneficial to all the
involved entities, when a user shares her activities
with her friends on a social media, while now
experiencing high quality personalized
recommendations from a third-party service under
a customized privacy guarantee, where only
obfuscated user activity data can be seen from the
social media platform to the third-party service.
Second, the third-party service may attract more
users (in particular privacy conscious users), when
providing high-quality recommendation services
with privacy protection. It can also gain main users
to make use of their service by providing
personalized and customized information of the
user.
FIG 2: System Architecture
4. CONCLUSION
We consider the personalized security settings of privacy
preserving social recommendation as a problem. We
propose a novel differential privacy-preserving framework
in a semi-centralized way which can protect users’ sensitive
ratings while being able to retain recommendation
effectiveness. Theoretic analysis and experimental
evaluation on real-world datasets demonstrate the
effectiveness of the proposed framework for
recommendation as well as privacy protection. Several
directions can be further investigated. Initially, we build in
factorization of matrix that is point based model this paper.
Study privacy preserving social recommendation using
ranking based models such as BPR (Rendleetal.2009)in the
future. Further, we take into consideration of static data.We
go through the temporal and dynamic data will be taken asa
problem. (Koren 2010) .
5. FUTURE WORK
• Noise perturbation against reconstruction attacks
also helps increase the level of privacy protection.
• With the similar privacy budget, the level of privacy
protection provided by PrivRank and DPMF are
similar. However PrivRank can achieve much better
recommendation effectiveness with different privacy
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7156
budgets for sensitive and non-sensitive ratings. We
perform t-test on recommendation effectiveness of
PrivRank and DPMF with the same privacy budgets
for sensitive ratings
REFERENCES
[1] Chaudhuri, K.; Monteleoni, C.; and Sarwate,A.D.
2011. Differentially private empirical risk
minimization. Journal ofMachineLearningResearch
12(3):1069–1109.
[2] Dwork, C.; McSherry, F.; Nissim, K.; and Smith,A.
2006. Calibrating noise to sensitivity in privatedata
analysis. In TCC, 265–284.
[3] Fredrikson, M.; Lantz, E.; Jha, S.; Lin, S.; Page, D.;
and Ristenpart, T. 2014. Privacy in
pharmacogenetics: An end-toend case study of
personalized warfarin dosing. In USENIX, 17–32.
[4] Fredrikson, M.; Jha, S.; and Ristenpart, T.
2015. Model inversion attacks that exploit
confidence informationand basic countermeasures.
In CCS, 1322–1333.
[5] Hoens, T. R.; Blanton, M.; and Chawla, N.V.2010.
A private and reliable recommendation system for
social networks. In SocialCom, 816–825.
[6] Hua, J.; Xia, C.; and Zhong, S. 2015. Differentially
private matrix factorization. In IJCAI, 1763–1770.
[7] Jorgensen, Z., and Yu, T. 2014. A privacy-
preserving framework for personalized, social
recommendations. In EDBT, 571–582.
[8] Komarova, T.; Nekipelov, D.; and Yakovlev, E.
2013. Estimation of treatment effects from
combined data: Identification versus data security.
In Iccas-Sice, 3066–3071.
[9] Koren, Y.; Bell, R. M.; and Volinsky, C. 2009.
Matrix factorization techniques for recommender
systems. IEEE Computer 42(8):30–37.
[10] Koren, Y. 2008. Factorization meets the
neighborhood: a multifaceted collaborative filtering
model. In SIGKDD, 426–434.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7157

More Related Content

What's hot

exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)IOSR Journals
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingIRJET Journal
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesEditorJST
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
 
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTIONAN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTIONIJNSA Journal
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchMigrant Systems
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET Journal
 
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksVenkat Projects
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET Journal
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup ToolsTanya Ahmed
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalShallu Behar-Sheehan FCIM
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYIJNSA Journal
 

What's hot (20)

exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
 
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTIONAN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
 
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup Tools
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 

Similar to Personalized Privacy-Preserving Social Recommendation

Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...JAYAPRAKASH JPINFOTECH
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving dataKamal Spring
 
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Ioannis Krontiris
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 

Similar to Personalized Privacy-Preserving Social Recommendation (20)

Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving data
 
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Personalized Privacy-Preserving Social Recommendation

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7153 Personalised privacy-preserving social recommendation Based on Ranking systems G.Bindhu Harshitha1, J. Priyanka2, A.Pravallika3 , A.Jasmine Gilda4 1 Computer Science and Engineering Dept of RMK Engineering College 2 Computer Science and Engineering Dept of RMK Engineering College 3Computer Science and Engineering Dept of RMK Engineering College 4Associate Professor, Computer Science and Engineering Dept of RMK Engineering College,Tamil Nadu,Chennai ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Personalized recommendationiscrucial tohelp the users find pertinent information as the user requested but in this paper we need to obfuscate the users data without being socialized ,where a user has both their public data and private data .Some of the users would prefer to publish their private data where some of them would refuse to so in order to overcome this issue we have proposed PrivRank, a customizable and continues privacy preserving social media data publishing frame work protecting users against inference attacks while enabling personalized ranking-based recommendations,whileenablingtheprivacy preserving we will not be allowing an 3rd party user to know the users information. This helps the user’s data to be protected and obfuscate it. The frame work helps the user get the information correctly as requested in a trusted way. Our frame work can efficiently provide effective and continues protection of user-specified private data, while still preserving the utility of the obfuscated data for personalizedranking-based recommendation,in whichusers can model ratings and social relationships privately The social Recommendation with least privacy leakage to un- trusted recommender and other users (i.e., friends) is an important yet Challenging problem. Key Words: Privacy-preserving data publishing, customized privacy protection, personalization, ranking- based recommendation, Social media, location based social networks. 1.INTRODUCTION The recommender system has become an important component on this online platform. With increasingofsocial networks, recommender systems can take advantage of these social relationships to furtherimproveeffectiveness of recommendation Despite their effectiveness, these social relationship-based recommender systems (i.e., social recommendation), may introduce another source of privacy leakage. For example, by observing a users’ ratings on products such as adult or medical items, the attacker may infer the users private information. In practice, privacy- preserving social recommender systems, which can provide an accurate recommendation results without sacrificing users’ privacy, is very necessary. The major issue faced by the user is leakage of their private information when ever recommended or posted. First, a vast majority of existing efforts heavily depend on an assumption that the recommender is fully trusted network and start to use it. They neglect the fact that the recommenderitselfmaybeun- trusted and produce malicious behaviours, causing serious privacy leakage. Second, some other works rely on cryptography to prevent users’ exact inputs from being leaked to the un-trusted recommender. Moreover, it has been shown that attackers can still infer sensitive information from the user based by their influence on the final results. Third, some of the existing works rely on friend’s history ratings to make recommendations. Social media sites such as IMDB and Facebook allow users to specify the visibility of their ratings on products. Treating equally all the sensitive ratings and thus not exposing any non-sensitive ratings will make it difficult to attract common-interest friends and make effective recommendations, sacrificing user experience in the long run. Our work actually allows to disclosingthenon-sensitive rating, but prevents sensitive ratingsfrombeingleakedfrom the exposed non-sensitive ratings. Resolving all the above mentioned defects is necessary for building an effective privacy-preserving social recommender system, which is a very challenging task due to the following reasons: First, to eliminate the assumption that a recommender is fully trustful, we need to change the recommender system to a semi-centralized manner from a fully centralized. In other words, instead of fully relying on the Challenging, we now allow users and the recommender to collaborate together in the course of recommendation. Specifically, users can take part in publishing their own ratings, while the recommender canonlyhave accesstonon- sensitive(public data) ratings, and both partiesinteractwith each other to make the final recommendation. Second,isthat when a user unknowingly collaborates with the 3rd part users then their historical data and their futuredata canalso be known to the 3rd part users, the second challenge is to continuously preserve the user data stream withoutleakage of their data. Third issue noticed is on the ranking based recommendation where the user recommends to get their data , here it is being adopted b man of the users to get the higher ranking output, so when the data is obfuscated ranking loss is occurred not in all cases but to overcome this
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7154 loss it requires high cost, the third challenge is to efficiently bound the ranking –loss when the data is obfuscated. 1.1 Historical data publishing When a user subscribes to a third-party service for the first time, the service provider has access to the user’s entire historical public data to obfuscate the user’s historical data, we minimize the privacy leakage from her historical data by obfuscating her data using data from another user whose historical data is similar but with less privacy leakage. 1.2 Online data publishing After the user subscribed to third-party services, the service provider also has real-time access to her future public data stream. Due to efficiency considerations, online data publishing should be performed based on incoming data instances only (e.g., a rating/tagging/checking-in activity on an item), without accessing the user’s historical data. Therefore, we minimize the privacy leakage from individual activity data instance by obfuscatingthedata streamon-the- fly. 2. RELATED WORK To protect and continuously provide privacy to the user published data the existing systemdependsonsomepolicies where even it cannot guaranty that the storedandpublished user data can be protected from malicious attackers. So, the key idea is to mainly obfuscate the data when published data remains useful for some application scenarios while the individual’s privacy is preserved. According to the issues occurs they are categorized into 2 types: Fig -1: System workflow for privacy-preserving publishing of social media data: 1) Users report their activity (i.e.,publicdata)on social media services; 2) PrivRank publishes the obfuscated public data to third-party service providers; and 3)thethird-partyservice providers can still deliver high-quality personalizedranking-based recommendation to user The first category is based on heuristic techniquestoprotect the ad-hoc defined user privacy. Specific solutions mainly tackle the privacy threat when attackers are able to link the data user’s identity to a record based on the published data. For example, to protect user privacy from identity disclosure, K-anonymity obfuscates the produced data so that each record cannot be distinguished from at least k-1 other records. However, since these techniquesusuallyhave ad-hoc privacy definitions, they have been proventobenon- universal and can only be successful against limited adversaries. The second category focuses on the uninformative principle, i.e., on the fact that the published data should provide attackers with as little additional information as possible beyond background knowledge provided. Differential privacy is a well-known technique that is known to guarantee user privacy against attackers with unknown background knowledge. They try to quantitatively measure privacy leakage based on various entropy-based metrics such as conditional entropy and mutual information and to design privacy protectionmechanismsbasedonthose measures. Although the idea of differential privacyisstricter (i.e., against attackers with arbitrary background knowledge) than that of information-theoretic approaches. Where, information theory can provide informative guidelines to quantitatively measure the amount of a user’s private information that an adversary can know by observing and analyzing the user’s public data (i.e., the privacy leakage of private data from public data). In this case stud we support the information-theoretic approach. The privacy leakage of private data from the published public data, this is minimized by obfuscating the users data In the current literature, theobfuscationmethods mainly ensures data utility by bounding the data distortion using metrics such as Euclidean distance , Squared L2 distance , Hamming distance or Jensen- Shannon distance. They are similar to limiting the loss of predicting user ratings on items, where the goal is to minimize the overall difference (e.g., mean absolute error) between the predicted and the real ratings from the users. Therefore minimizing such a rating prediction error is widely adopted by the research community, ranking-based (or top-N) recommendation is more practical and is actually adopted by many of the e-commercial platforms.Specifically, different from rating prediction that tries to infer the user rating information, where as ranking-based recommendation show the mostly liked pages to appear on the top, we argue that the bounding of data of ranking based is occurred due to obfuscation where it shows the wrong data rather than the correct produced ranking data in order to dissolve this we use Kendall- t method to overcome this issue to provide the actual data to the user.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7155 3. PRELIMINARIES In the figure shown above about the cycle how PrivRank is made used to protect the user’s from attackers. All theuser’s wishes for a secure search recommendation issue occurs when 1. When a user actually shares their data such as (tagging, commenting, ratings) in social media with anyone else. 2. When the subscribe to an 3rd part users their data gets attacked, Which makes the attacker to use the historical a well as the future data of the particular user. Eg: when a person goes to a movie along with their friends the tag them and make their location available to all the social friends, and the rate the movie according to their wish but the personal data i.e their private data such as their name location must be kept secured in order to prevent this we make use of PrivRank. When a user unknowingly make use of the 3rd party user’s we obfuscate the data to avoid inference attacksorleakageproblems, instead the 3rd part can act as a privacy protected recommender including high raking- based system. Our system workflow is beneficial to all the involved entities, when a user shares her activities with her friends on a social media, while now experiencing high quality personalized recommendations from a third-party service under a customized privacy guarantee, where only obfuscated user activity data can be seen from the social media platform to the third-party service. Second, the third-party service may attract more users (in particular privacy conscious users), when providing high-quality recommendation services with privacy protection. It can also gain main users to make use of their service by providing personalized and customized information of the user. FIG 2: System Architecture 4. CONCLUSION We consider the personalized security settings of privacy preserving social recommendation as a problem. We propose a novel differential privacy-preserving framework in a semi-centralized way which can protect users’ sensitive ratings while being able to retain recommendation effectiveness. Theoretic analysis and experimental evaluation on real-world datasets demonstrate the effectiveness of the proposed framework for recommendation as well as privacy protection. Several directions can be further investigated. Initially, we build in factorization of matrix that is point based model this paper. Study privacy preserving social recommendation using ranking based models such as BPR (Rendleetal.2009)in the future. Further, we take into consideration of static data.We go through the temporal and dynamic data will be taken asa problem. (Koren 2010) . 5. FUTURE WORK • Noise perturbation against reconstruction attacks also helps increase the level of privacy protection. • With the similar privacy budget, the level of privacy protection provided by PrivRank and DPMF are similar. However PrivRank can achieve much better recommendation effectiveness with different privacy
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7156 budgets for sensitive and non-sensitive ratings. We perform t-test on recommendation effectiveness of PrivRank and DPMF with the same privacy budgets for sensitive ratings REFERENCES [1] Chaudhuri, K.; Monteleoni, C.; and Sarwate,A.D. 2011. Differentially private empirical risk minimization. Journal ofMachineLearningResearch 12(3):1069–1109. [2] Dwork, C.; McSherry, F.; Nissim, K.; and Smith,A. 2006. Calibrating noise to sensitivity in privatedata analysis. In TCC, 265–284. [3] Fredrikson, M.; Lantz, E.; Jha, S.; Lin, S.; Page, D.; and Ristenpart, T. 2014. Privacy in pharmacogenetics: An end-toend case study of personalized warfarin dosing. In USENIX, 17–32. [4] Fredrikson, M.; Jha, S.; and Ristenpart, T. 2015. Model inversion attacks that exploit confidence informationand basic countermeasures. In CCS, 1322–1333. [5] Hoens, T. R.; Blanton, M.; and Chawla, N.V.2010. A private and reliable recommendation system for social networks. In SocialCom, 816–825. [6] Hua, J.; Xia, C.; and Zhong, S. 2015. Differentially private matrix factorization. In IJCAI, 1763–1770. [7] Jorgensen, Z., and Yu, T. 2014. A privacy- preserving framework for personalized, social recommendations. In EDBT, 571–582. [8] Komarova, T.; Nekipelov, D.; and Yakovlev, E. 2013. Estimation of treatment effects from combined data: Identification versus data security. In Iccas-Sice, 3066–3071. [9] Koren, Y.; Bell, R. M.; and Volinsky, C. 2009. Matrix factorization techniques for recommender systems. IEEE Computer 42(8):30–37. [10] Koren, Y. 2008. Factorization meets the neighborhood: a multifaceted collaborative filtering model. In SIGKDD, 426–434.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7157