SlideShare a Scribd company logo
Supporting Privacy Protection in Personalized
Web Search
ABSTRACT
Personalized web search (PWS) has demonstrated its effectiveness in improving the
quality of various search services on the Internet. However, evidences show that users’
reluctance to disclose their private information during search has become a major barrier for the
wide proliferation of PWS. We study privacy protection in PWS applications that model user
preferences as hierarchical user profiles. We propose a PWS framework called UPS that can
adaptively generalize profiles by queries while respecting user specified privacy requirements.
Our runtime generalization aims at striking a balance between two predictive metrics that
evaluate the utility of personalization and the privacy risk of exposing the generalized profile.
We present two greedy algorithms, namely Greedy DP and Greedy IL, for runtime
generalization. We also provide an online prediction mechanism for deciding whether
personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our
framework. The experimental results also reveal that Greedy IL significantly outperforms
Greedy DP in terms of efficiency.
Existing System
The existing profile-based Personalized Web Search do not support runtime profiling. A
user profile is typically generalized for only once offline, and used to personalize all queries
from a same user indiscriminatingly. Such “one profile fits all” strategy certainly has drawbacks
given the variety of queries. One evidence reported in is that profile-based personalization may
not even help to improve the search quality for some ad hoc queries, though exposing user
profile to a server has put the user’s privacy at risk.
The existing methods do not take into account the customization of privacy requirements.
This probably makes some user privacy to be overprotected while others insufficiently protected.
For example, in, all the sensitive topics are detected using an absolute metric called surprisal
based on the information theory, assuming that the interests with less user document support are
more sensitive. However, this assumption can be doubted with a simple counterexample: If a
user has a large number of documents about “sex,” the surprisal of this topic may lead to a
conclusion that “sex” is very general and not sensitive, despite the truth which is opposite.
Unfortunately, few prior work can effectively address individual privacy needs during the
generalization.
Many personalization techniques require iterative user interactions when creating personalized
search results. They usually refine the search results with some metrics which require multiple
user interactions, such as rank scoring, average rank, and so on. This paradigm is, however,
infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also
demand prohibitive processing time for profiling. Thus, we need predictive metrics to measure
the search quality and breach risk after personalization, without incurring iterative user
interaction.
Disadvantage:
All the sensitive topics are detected using an absolute metric called surprisal based on the
information theory.
Proposed System:
We propose a privacy-preserving personalized web search framework UPS, which can
generalize profiles for each query according to user-specified privacy requirements. Relying on
the definition of two conflicting metrics, namely personalization utility and privacy risk, for
hierarchical user profile, we formulate the problem of privacy-preserving personalized search as
Risk Profile Generalization, with its NP-hardness proved.
We develop two simple but effective generalization algorithms, Greedy DP and Greedy
IL, to support runtime profiling. While the former tries to maximize the discriminating power
(DP), the latter attempts to minimize the information loss (IL). By exploiting a number of
heuristics, Greedy IL outperforms Greedy DP significantly.
We provide an inexpensive mechanism for the client to decide whether to personalize a
query in UPS. This decision can be made before each runtime profiling to enhance the stability
of the search results while avoid the unnecessary exposure of the profile.
Advantages:
1. It enhances the stability of the search quality.
2. It avoids the unnecessary exposure of the user profile.
Architecture:
Enhanced
MODULES”
1. Profile-Based Personalization.
2. Privacy Protection in PWS System.
3. Generalizing User Profile.
4. Online Decision.
Modules Description
1. Profile-Based Personalization
This paper introduces an approach to personalize digital multimedia content based on
user profile information. For this, two main mechanisms were developed: a profile
generator that automatically creates user profiles representing the user preferences, and a
content-based recommendation algorithm that estimates the user's interest in unknown
content by matching her profile to metadata descriptions of the content. Both features are
integrated into a personalization system.
2. Privacy Protection in PWS System
We propose a PWS framework called UPS that can generalize profiles in for each
query according to user-specified privacy requirements. Two predictive metrics are
proposed to evaluate the privacy breach risk and the query utility for hierarchical user
profile. We develop two simple but effective generalization algorithms for user profiles
allowing for query-level customization using our proposed metrics. We also provide an
online prediction mechanism based on query utility for deciding whether to personalize a
query in UPS. Extensive experiments demonstrate the efficiency and effectiveness of our
framework.
3. Generalizing User Profile
The generalization process has to meet specific prerequisites to handle the user
profile. This is achieved by preprocessing the user profile. At first, the process initializes
the user profile by taking the indicated parent user profile into account. The process adds
the inherited properties to the properties of the local user profile. Thereafter the process
loads the data for the foreground and the background of the map according to the
described selection in the user profile.
Additionally, using references enables caching and is helpful when considering an
implementation in a production environment. The reference to the user profile can be
used as an identifier for already processed user profiles. It allows performing the
customization process once, but reusing the result multiple times. However, it has to be
made sure, that an update of the user profile is also propagated to the generalization
process. This requires specific update strategies, which check after a specific timeout or a
specific event, if the user profile has not changed yet. Additionally, as the generalization
process involves remote data services, which might be updated frequently, the cached
generalization results might become outdated. Thus selecting a specific caching strategy
requires careful analysis.
4. Online Decision
The profile-based personalization contributes little or even reduces the search
quality, while exposing the profile to a server would for sure risk the user’s privacy. To
address this problem, we develop an online mechanism to decide whether to personalize a
query. The basic idea is straightforward. if a distinct query is identified during
generalization, the entire runtime profiling will be aborted and the query will be sent to
the server without a user profile.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB (min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql
 Database Connectivity : JDBC.
CONCLUSION
This paper presented a client-side privacy protection framework called UPS for
personalized web search. UPS could potentially be adopted by any PWS that captures user
profiles in a hierarchical taxonomy. The framework allowed users to specify customized privacy
requirements via the hierarchical profiles. In addition, UPS also performed online generalization
on user profiles to protect the personal privacy without compromising the search quality. We
proposed two greedy algorithms, namely GreedyDP and GreedyIL, for the online generalization.
Our experimental results revealed that UPS could achieve quality search results while preserving
user’s customized privacy requirements. The results also confirmed the effectiveness and
efficiency of our solution.
REFERENCES
[1] Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of Personalized
Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp. 581-590, 2007.
[2] J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated Analysis of
Interests and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in
Information Retrieval (SIGIR), pp. 449-456, 2005.
[3] M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,” Proc.
IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005.
[4] B. Tan, X. Shen, and C. Zhai, “Mining Long-Term Search History to Improve Search
Accuracy,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD),
2006.
[5] K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile
Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World Wide Web (WWW),
2004.
Scope:
To protect user privacy in profile-based PWS, researchers have to consider two
contradicting effects during the search process. On the one hand, they attempt to improve the
search quality with the personalization utility of the user profile. On the other hand, they need to
hide the privacy contents existing in the user profile to place the privacy risk under control. A
few previous studies , suggest that people are willing to compromise privacy if the
personalization by supplying user profile to the search engine yields better search quality. In an
ideal case, significant gain can be obtained by personalization at the expense of only a small (and
less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be
protected without compromising the personalized search quality. In general, there is a tradeoff
between the search quality and the level of privacy protection achieved from generalization.
hide the privacy contents existing in the user profile to place the privacy risk under control. A
few previous studies , suggest that people are willing to compromise privacy if the
personalization by supplying user profile to the search engine yields better search quality. In an
ideal case, significant gain can be obtained by personalization at the expense of only a small (and
less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be
protected without compromising the personalized search quality. In general, there is a tradeoff
between the search quality and the level of privacy protection achieved from generalization.

More Related Content

What's hot

Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
Shakas Technologies
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Shakas Technologies
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
chennaijp
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
Editor IJMTER
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
swathi78
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
Migrant Systems
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
Saurav Kumar
 
G017415465
G017415465G017415465
G017415465
IOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
Gayathri1317
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
IRJET Journal
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
IJERA Editor
 
Ijcet 06 10_004
Ijcet 06 10_004Ijcet 06 10_004
Ijcet 06 10_004
IAEME Publication
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
ijdpsjournal
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EngineSantosh Dawange
 
WISE2019 presentation
WISE2019 presentationWISE2019 presentation
WISE2019 presentation
Yusuke Yamamoto
 

What's hot (20)

Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Personalized Web Search
Personalized Web SearchPersonalized Web Search
Personalized Web Search
 
Personalized web search
Personalized web searchPersonalized web search
Personalized web search
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
 
G017415465
G017415465G017415465
G017415465
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
 
Ijcet 06 10_004
Ijcet 06 10_004Ijcet 06 10_004
Ijcet 06 10_004
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search Engine
 
WISE2019 presentation
WISE2019 presentationWISE2019 presentation
WISE2019 presentation
 

Similar to 1.supporting privacy protection in personalized web search..9440480873 ,projects available

SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
nikhil421080
 
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
IEEEMEMTECHSTUDENTSPROJECTS
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
RamaKrishnaReddyKona
 
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web SearchSupporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
IRJET Journal
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
IRJET Journal
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
Shivlal Mewada
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
ijmpict
 
EaZSearch
EaZSearch EaZSearch
EaZSearch
IRJET Journal
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
ijceronline
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
JAYAPRAKASH JPINFOTECH
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
Papitha Velumani
 
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search EngineJAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
IEEEGLOBALSOFTTECHNOLOGIES
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
IEEEFINALYEARPROJECTS
 

Similar to 1.supporting privacy protection in personalized web search..9440480873 ,projects available (20)

SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
 
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web SearchSupporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
EaZSearch
EaZSearch EaZSearch
EaZSearch
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
 
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Base...
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
 
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search EngineJAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
 

Recently uploaded

原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
Erection Methodology (KG Marg) MLCP.pptx
Erection Methodology (KG Marg) MLCP.pptxErection Methodology (KG Marg) MLCP.pptx
Erection Methodology (KG Marg) MLCP.pptx
zrahman0161
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
Ben Woelk, CISSP, CPTC
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
ashiquepa3
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
yuhofha
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024
Dr. Mary Askew
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
MISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMA
MISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMAMISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMA
MISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMA
DK PAGEANT
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
PaviBangera
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 

Recently uploaded (20)

原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
Erection Methodology (KG Marg) MLCP.pptx
Erection Methodology (KG Marg) MLCP.pptxErection Methodology (KG Marg) MLCP.pptx
Erection Methodology (KG Marg) MLCP.pptx
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
MISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMA
MISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMAMISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMA
MISS TEEN GONDA 2024 - WINNER ABHA VISHWAKARMA
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 

1.supporting privacy protection in personalized web search..9440480873 ,projects available

  • 1. Supporting Privacy Protection in Personalized Web Search ABSTRACT Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely Greedy DP and Greedy IL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our framework. The experimental results also reveal that Greedy IL significantly outperforms Greedy DP in terms of efficiency.
  • 2. Existing System The existing profile-based Personalized Web Search do not support runtime profiling. A user profile is typically generalized for only once offline, and used to personalize all queries from a same user indiscriminatingly. Such “one profile fits all” strategy certainly has drawbacks given the variety of queries. One evidence reported in is that profile-based personalization may not even help to improve the search quality for some ad hoc queries, though exposing user profile to a server has put the user’s privacy at risk. The existing methods do not take into account the customization of privacy requirements. This probably makes some user privacy to be overprotected while others insufficiently protected. For example, in, all the sensitive topics are detected using an absolute metric called surprisal based on the information theory, assuming that the interests with less user document support are more sensitive. However, this assumption can be doubted with a simple counterexample: If a user has a large number of documents about “sex,” the surprisal of this topic may lead to a conclusion that “sex” is very general and not sensitive, despite the truth which is opposite. Unfortunately, few prior work can effectively address individual privacy needs during the generalization. Many personalization techniques require iterative user interactions when creating personalized search results. They usually refine the search results with some metrics which require multiple user interactions, such as rank scoring, average rank, and so on. This paradigm is, however, infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive processing time for profiling. Thus, we need predictive metrics to measure the search quality and breach risk after personalization, without incurring iterative user interaction. Disadvantage: All the sensitive topics are detected using an absolute metric called surprisal based on the information theory.
  • 3. Proposed System: We propose a privacy-preserving personalized web search framework UPS, which can generalize profiles for each query according to user-specified privacy requirements. Relying on the definition of two conflicting metrics, namely personalization utility and privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving personalized search as Risk Profile Generalization, with its NP-hardness proved. We develop two simple but effective generalization algorithms, Greedy DP and Greedy IL, to support runtime profiling. While the former tries to maximize the discriminating power (DP), the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics, Greedy IL outperforms Greedy DP significantly. We provide an inexpensive mechanism for the client to decide whether to personalize a query in UPS. This decision can be made before each runtime profiling to enhance the stability of the search results while avoid the unnecessary exposure of the profile. Advantages: 1. It enhances the stability of the search quality. 2. It avoids the unnecessary exposure of the user profile.
  • 5. MODULES” 1. Profile-Based Personalization. 2. Privacy Protection in PWS System. 3. Generalizing User Profile. 4. Online Decision. Modules Description 1. Profile-Based Personalization This paper introduces an approach to personalize digital multimedia content based on user profile information. For this, two main mechanisms were developed: a profile generator that automatically creates user profiles representing the user preferences, and a content-based recommendation algorithm that estimates the user's interest in unknown content by matching her profile to metadata descriptions of the content. Both features are integrated into a personalization system. 2. Privacy Protection in PWS System We propose a PWS framework called UPS that can generalize profiles in for each query according to user-specified privacy requirements. Two predictive metrics are proposed to evaluate the privacy breach risk and the query utility for hierarchical user profile. We develop two simple but effective generalization algorithms for user profiles allowing for query-level customization using our proposed metrics. We also provide an online prediction mechanism based on query utility for deciding whether to personalize a query in UPS. Extensive experiments demonstrate the efficiency and effectiveness of our framework. 3. Generalizing User Profile
  • 6. The generalization process has to meet specific prerequisites to handle the user profile. This is achieved by preprocessing the user profile. At first, the process initializes the user profile by taking the indicated parent user profile into account. The process adds the inherited properties to the properties of the local user profile. Thereafter the process loads the data for the foreground and the background of the map according to the described selection in the user profile. Additionally, using references enables caching and is helpful when considering an implementation in a production environment. The reference to the user profile can be used as an identifier for already processed user profiles. It allows performing the customization process once, but reusing the result multiple times. However, it has to be made sure, that an update of the user profile is also propagated to the generalization process. This requires specific update strategies, which check after a specific timeout or a specific event, if the user profile has not changed yet. Additionally, as the generalization process involves remote data services, which might be updated frequently, the cached generalization results might become outdated. Thus selecting a specific caching strategy requires careful analysis. 4. Online Decision The profile-based personalization contributes little or even reduces the search quality, while exposing the profile to a server would for sure risk the user’s privacy. To address this problem, we develop an online mechanism to decide whether to personalize a query. The basic idea is straightforward. if a distinct query is identified during generalization, the entire runtime profiling will be aborted and the query will be sent to the server without a user profile. System Configuration:- H/W System Configuration:-
  • 7. Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC. CONCLUSION This paper presented a client-side privacy protection framework called UPS for personalized web search. UPS could potentially be adopted by any PWS that captures user profiles in a hierarchical taxonomy. The framework allowed users to specify customized privacy
  • 8. requirements via the hierarchical profiles. In addition, UPS also performed online generalization on user profiles to protect the personal privacy without compromising the search quality. We proposed two greedy algorithms, namely GreedyDP and GreedyIL, for the online generalization. Our experimental results revealed that UPS could achieve quality search results while preserving user’s customized privacy requirements. The results also confirmed the effectiveness and efficiency of our solution. REFERENCES [1] Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of Personalized Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp. 581-590, 2007. [2] J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated Analysis of Interests and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR), pp. 449-456, 2005. [3] M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,” Proc. IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005. [4] B. Tan, X. Shen, and C. Zhai, “Mining Long-Term Search History to Improve Search Accuracy,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), 2006. [5] K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World Wide Web (WWW), 2004. Scope: To protect user privacy in profile-based PWS, researchers have to consider two contradicting effects during the search process. On the one hand, they attempt to improve the search quality with the personalization utility of the user profile. On the other hand, they need to
  • 9. hide the privacy contents existing in the user profile to place the privacy risk under control. A few previous studies , suggest that people are willing to compromise privacy if the personalization by supplying user profile to the search engine yields better search quality. In an ideal case, significant gain can be obtained by personalization at the expense of only a small (and less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be protected without compromising the personalized search quality. In general, there is a tradeoff between the search quality and the level of privacy protection achieved from generalization.
  • 10. hide the privacy contents existing in the user profile to place the privacy risk under control. A few previous studies , suggest that people are willing to compromise privacy if the personalization by supplying user profile to the search engine yields better search quality. In an ideal case, significant gain can be obtained by personalization at the expense of only a small (and less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be protected without compromising the personalized search quality. In general, there is a tradeoff between the search quality and the level of privacy protection achieved from generalization.