Submit Search
Upload
Personalized Privacy-Preserving Social Recommendation
•
0 likes
•
32 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I3808.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
IJERA Editor
NDSS_submission_240
NDSS_submission_240
Sakshi Jain
Threats_Report_2013
Threats_Report_2013
Mary Claire Thompson
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
aciijournal
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
IRJET Journal
Recommended
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
IJERA Editor
NDSS_submission_240
NDSS_submission_240
Sakshi Jain
Threats_Report_2013
Threats_Report_2013
Mary Claire Thompson
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
aciijournal
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
IRJET Journal
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
swathi78
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
IOSR Journals
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
IRJET Journal
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
EditorJST
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
IJNSA Journal
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET Journal
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
Venkat Projects
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET Journal
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
ijp2p
Usability Review of Mashup Tools
Usability Review of Mashup Tools
Tanya Ahmed
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
Measuring privacy in online social
Measuring privacy in online social
ijsptm
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
More Related Content
What's hot
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
swathi78
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
IOSR Journals
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
IRJET Journal
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
EditorJST
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
IJNSA Journal
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET Journal
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
Venkat Projects
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET Journal
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
ijp2p
Usability Review of Mashup Tools
Usability Review of Mashup Tools
Tanya Ahmed
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
What's hot
(20)
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
Usability Review of Mashup Tools
Usability Review of Mashup Tools
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
Similar to Personalized Privacy-Preserving Social Recommendation
Measuring privacy in online social
Measuring privacy in online social
ijsptm
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
Final review m score
Final review m score
azhar4010
Data security and privacy
Data security and privacy
rajab ssemwogerere
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IJITE
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
JAYAPRAKASH JPINFOTECH
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
JAYAPRAKASH JPINFOTECH
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
JAYAPRAKASH JPINFOTECH
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
Anonymity based privacy-preserving data
Anonymity based privacy-preserving data
Kamal Spring
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...
Ioannis Krontiris
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
Similar to Personalized Privacy-Preserving Social Recommendation
(20)
Measuring privacy in online social
Measuring privacy in online social
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Final review m score
Final review m score
Data security and privacy
Data security and privacy
Ijcatr04041017
Ijcatr04041017
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
Anonymity based privacy-preserving data
Anonymity based privacy-preserving data
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Recently uploaded
(20)
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Personalized Privacy-Preserving Social Recommendation
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7153 Personalised privacy-preserving social recommendation Based on Ranking systems G.Bindhu Harshitha1, J. Priyanka2, A.Pravallika3 , A.Jasmine Gilda4 1 Computer Science and Engineering Dept of RMK Engineering College 2 Computer Science and Engineering Dept of RMK Engineering College 3Computer Science and Engineering Dept of RMK Engineering College 4Associate Professor, Computer Science and Engineering Dept of RMK Engineering College,Tamil Nadu,Chennai ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Personalized recommendationiscrucial tohelp the users find pertinent information as the user requested but in this paper we need to obfuscate the users data without being socialized ,where a user has both their public data and private data .Some of the users would prefer to publish their private data where some of them would refuse to so in order to overcome this issue we have proposed PrivRank, a customizable and continues privacy preserving social media data publishing frame work protecting users against inference attacks while enabling personalized ranking-based recommendations,whileenablingtheprivacy preserving we will not be allowing an 3rd party user to know the users information. This helps the user’s data to be protected and obfuscate it. The frame work helps the user get the information correctly as requested in a trusted way. Our frame work can efficiently provide effective and continues protection of user-specified private data, while still preserving the utility of the obfuscated data for personalizedranking-based recommendation,in whichusers can model ratings and social relationships privately The social Recommendation with least privacy leakage to un- trusted recommender and other users (i.e., friends) is an important yet Challenging problem. Key Words: Privacy-preserving data publishing, customized privacy protection, personalization, ranking- based recommendation, Social media, location based social networks. 1.INTRODUCTION The recommender system has become an important component on this online platform. With increasingofsocial networks, recommender systems can take advantage of these social relationships to furtherimproveeffectiveness of recommendation Despite their effectiveness, these social relationship-based recommender systems (i.e., social recommendation), may introduce another source of privacy leakage. For example, by observing a users’ ratings on products such as adult or medical items, the attacker may infer the users private information. In practice, privacy- preserving social recommender systems, which can provide an accurate recommendation results without sacrificing users’ privacy, is very necessary. The major issue faced by the user is leakage of their private information when ever recommended or posted. First, a vast majority of existing efforts heavily depend on an assumption that the recommender is fully trusted network and start to use it. They neglect the fact that the recommenderitselfmaybeun- trusted and produce malicious behaviours, causing serious privacy leakage. Second, some other works rely on cryptography to prevent users’ exact inputs from being leaked to the un-trusted recommender. Moreover, it has been shown that attackers can still infer sensitive information from the user based by their influence on the final results. Third, some of the existing works rely on friend’s history ratings to make recommendations. Social media sites such as IMDB and Facebook allow users to specify the visibility of their ratings on products. Treating equally all the sensitive ratings and thus not exposing any non-sensitive ratings will make it difficult to attract common-interest friends and make effective recommendations, sacrificing user experience in the long run. Our work actually allows to disclosingthenon-sensitive rating, but prevents sensitive ratingsfrombeingleakedfrom the exposed non-sensitive ratings. Resolving all the above mentioned defects is necessary for building an effective privacy-preserving social recommender system, which is a very challenging task due to the following reasons: First, to eliminate the assumption that a recommender is fully trustful, we need to change the recommender system to a semi-centralized manner from a fully centralized. In other words, instead of fully relying on the Challenging, we now allow users and the recommender to collaborate together in the course of recommendation. Specifically, users can take part in publishing their own ratings, while the recommender canonlyhave accesstonon- sensitive(public data) ratings, and both partiesinteractwith each other to make the final recommendation. Second,isthat when a user unknowingly collaborates with the 3rd part users then their historical data and their futuredata canalso be known to the 3rd part users, the second challenge is to continuously preserve the user data stream withoutleakage of their data. Third issue noticed is on the ranking based recommendation where the user recommends to get their data , here it is being adopted b man of the users to get the higher ranking output, so when the data is obfuscated ranking loss is occurred not in all cases but to overcome this
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7154 loss it requires high cost, the third challenge is to efficiently bound the ranking –loss when the data is obfuscated. 1.1 Historical data publishing When a user subscribes to a third-party service for the first time, the service provider has access to the user’s entire historical public data to obfuscate the user’s historical data, we minimize the privacy leakage from her historical data by obfuscating her data using data from another user whose historical data is similar but with less privacy leakage. 1.2 Online data publishing After the user subscribed to third-party services, the service provider also has real-time access to her future public data stream. Due to efficiency considerations, online data publishing should be performed based on incoming data instances only (e.g., a rating/tagging/checking-in activity on an item), without accessing the user’s historical data. Therefore, we minimize the privacy leakage from individual activity data instance by obfuscatingthedata streamon-the- fly. 2. RELATED WORK To protect and continuously provide privacy to the user published data the existing systemdependsonsomepolicies where even it cannot guaranty that the storedandpublished user data can be protected from malicious attackers. So, the key idea is to mainly obfuscate the data when published data remains useful for some application scenarios while the individual’s privacy is preserved. According to the issues occurs they are categorized into 2 types: Fig -1: System workflow for privacy-preserving publishing of social media data: 1) Users report their activity (i.e.,publicdata)on social media services; 2) PrivRank publishes the obfuscated public data to third-party service providers; and 3)thethird-partyservice providers can still deliver high-quality personalizedranking-based recommendation to user The first category is based on heuristic techniquestoprotect the ad-hoc defined user privacy. Specific solutions mainly tackle the privacy threat when attackers are able to link the data user’s identity to a record based on the published data. For example, to protect user privacy from identity disclosure, K-anonymity obfuscates the produced data so that each record cannot be distinguished from at least k-1 other records. However, since these techniquesusuallyhave ad-hoc privacy definitions, they have been proventobenon- universal and can only be successful against limited adversaries. The second category focuses on the uninformative principle, i.e., on the fact that the published data should provide attackers with as little additional information as possible beyond background knowledge provided. Differential privacy is a well-known technique that is known to guarantee user privacy against attackers with unknown background knowledge. They try to quantitatively measure privacy leakage based on various entropy-based metrics such as conditional entropy and mutual information and to design privacy protectionmechanismsbasedonthose measures. Although the idea of differential privacyisstricter (i.e., against attackers with arbitrary background knowledge) than that of information-theoretic approaches. Where, information theory can provide informative guidelines to quantitatively measure the amount of a user’s private information that an adversary can know by observing and analyzing the user’s public data (i.e., the privacy leakage of private data from public data). In this case stud we support the information-theoretic approach. The privacy leakage of private data from the published public data, this is minimized by obfuscating the users data In the current literature, theobfuscationmethods mainly ensures data utility by bounding the data distortion using metrics such as Euclidean distance , Squared L2 distance , Hamming distance or Jensen- Shannon distance. They are similar to limiting the loss of predicting user ratings on items, where the goal is to minimize the overall difference (e.g., mean absolute error) between the predicted and the real ratings from the users. Therefore minimizing such a rating prediction error is widely adopted by the research community, ranking-based (or top-N) recommendation is more practical and is actually adopted by many of the e-commercial platforms.Specifically, different from rating prediction that tries to infer the user rating information, where as ranking-based recommendation show the mostly liked pages to appear on the top, we argue that the bounding of data of ranking based is occurred due to obfuscation where it shows the wrong data rather than the correct produced ranking data in order to dissolve this we use Kendall- t method to overcome this issue to provide the actual data to the user.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7155 3. PRELIMINARIES In the figure shown above about the cycle how PrivRank is made used to protect the user’s from attackers. All theuser’s wishes for a secure search recommendation issue occurs when 1. When a user actually shares their data such as (tagging, commenting, ratings) in social media with anyone else. 2. When the subscribe to an 3rd part users their data gets attacked, Which makes the attacker to use the historical a well as the future data of the particular user. Eg: when a person goes to a movie along with their friends the tag them and make their location available to all the social friends, and the rate the movie according to their wish but the personal data i.e their private data such as their name location must be kept secured in order to prevent this we make use of PrivRank. When a user unknowingly make use of the 3rd party user’s we obfuscate the data to avoid inference attacksorleakageproblems, instead the 3rd part can act as a privacy protected recommender including high raking- based system. Our system workflow is beneficial to all the involved entities, when a user shares her activities with her friends on a social media, while now experiencing high quality personalized recommendations from a third-party service under a customized privacy guarantee, where only obfuscated user activity data can be seen from the social media platform to the third-party service. Second, the third-party service may attract more users (in particular privacy conscious users), when providing high-quality recommendation services with privacy protection. It can also gain main users to make use of their service by providing personalized and customized information of the user. FIG 2: System Architecture 4. CONCLUSION We consider the personalized security settings of privacy preserving social recommendation as a problem. We propose a novel differential privacy-preserving framework in a semi-centralized way which can protect users’ sensitive ratings while being able to retain recommendation effectiveness. Theoretic analysis and experimental evaluation on real-world datasets demonstrate the effectiveness of the proposed framework for recommendation as well as privacy protection. Several directions can be further investigated. Initially, we build in factorization of matrix that is point based model this paper. Study privacy preserving social recommendation using ranking based models such as BPR (Rendleetal.2009)in the future. Further, we take into consideration of static data.We go through the temporal and dynamic data will be taken asa problem. (Koren 2010) . 5. FUTURE WORK • Noise perturbation against reconstruction attacks also helps increase the level of privacy protection. • With the similar privacy budget, the level of privacy protection provided by PrivRank and DPMF are similar. However PrivRank can achieve much better recommendation effectiveness with different privacy
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7156 budgets for sensitive and non-sensitive ratings. We perform t-test on recommendation effectiveness of PrivRank and DPMF with the same privacy budgets for sensitive ratings REFERENCES [1] Chaudhuri, K.; Monteleoni, C.; and Sarwate,A.D. 2011. Differentially private empirical risk minimization. Journal ofMachineLearningResearch 12(3):1069–1109. [2] Dwork, C.; McSherry, F.; Nissim, K.; and Smith,A. 2006. Calibrating noise to sensitivity in privatedata analysis. In TCC, 265–284. [3] Fredrikson, M.; Lantz, E.; Jha, S.; Lin, S.; Page, D.; and Ristenpart, T. 2014. Privacy in pharmacogenetics: An end-toend case study of personalized warfarin dosing. In USENIX, 17–32. [4] Fredrikson, M.; Jha, S.; and Ristenpart, T. 2015. Model inversion attacks that exploit confidence informationand basic countermeasures. In CCS, 1322–1333. [5] Hoens, T. R.; Blanton, M.; and Chawla, N.V.2010. A private and reliable recommendation system for social networks. In SocialCom, 816–825. [6] Hua, J.; Xia, C.; and Zhong, S. 2015. Differentially private matrix factorization. In IJCAI, 1763–1770. [7] Jorgensen, Z., and Yu, T. 2014. A privacy- preserving framework for personalized, social recommendations. In EDBT, 571–582. [8] Komarova, T.; Nekipelov, D.; and Yakovlev, E. 2013. Estimation of treatment effects from combined data: Identification versus data security. In Iccas-Sice, 3066–3071. [9] Koren, Y.; Bell, R. M.; and Volinsky, C. 2009. Matrix factorization techniques for recommender systems. IEEE Computer 42(8):30–37. [10] Koren, Y. 2008. Factorization meets the neighborhood: a multifaceted collaborative filtering model. In SIGKDD, 426–434.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7157
Download now