SlideShare a Scribd company logo
Supporting Privacy Protection in Personalized
Web Search
ABSTRACT
Personalized web search (PWS) has demonstrated its effectiveness in improving the
quality of various search services on the Internet. However, evidences show that users’
reluctance to disclose their private information during search has become a major barrier for the
wide proliferation of PWS. We study privacy protection in PWS applications that model user
preferences as hierarchical user profiles. We propose a PWS framework called UPS that can
adaptively generalize profiles by queries while respecting userspecified privacy requirements.
Our runtime generalization aims at striking a balance between two predictive metrics that
evaluate the utility of personalization and the privacy risk of exposing the generalized profile.
We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization.
We also provide an online prediction mechanism for deciding whether personalizing a query is
beneficial. Extensive experiments demonstrate the effectiveness of our framework. The
experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of
efficiency.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Existing System
The existing profile-based Personalized Web Search do not support runtime profiling. A
user profile is typically generalized for only once offline, and used to personalize all queries
from a same user indiscriminatingly. Such “one profile fits all” strategy certainly has drawbacks
given the variety of queries. One evidence reported in is that profile-based personalization may
not even help to improve the search quality for some ad hoc queries, though exposing user
profile to a server has put the user’s privacy at risk.
The existing methods do not take into account the customization of privacy requirements.
This probably makes some user privacy to be overprotected while others insufficiently protected.
For example, in, all the sensitive topics are detected using an absolute metric called surprisal
based on the information theory, assuming that the interests with less user document support are
more sensitive. However, this assumption can be doubted with a simple counterexample: If a
user has a large number of documents about “sex,” the surprisal of this topic may lead to a
conclusion that “sex” is very general and not sensitive, despite the truth which is opposite.
Unfortunately, few prior work can effectively address individual privacy needs during the
generalization.
Many personalization techniques require iterative user interactions when creating personalized
search results. They usually refine the search results with some metrics which require multiple
user interactions, such as rank scoring, average rank, and so on. This paradigm is, however,
infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also
demand prohibitive processing time for profiling. Thus, we need predictive metrics to measure
the search quality and breach risk after personalization, without incurring iterative user
interaction.
Disadvantage:
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
All the sensitive topics are detected using an absolute metric called surprisal based on the
information theory.
Proposed System:
We propose a privacy-preserving personalized web search framework UPS, which can
generalize profiles for each query according to user-specified privacy requirements. Relying on
the definition of two conflicting metrics, namely personalization utility and privacy risk, for
hierarchical user profile, we formulate the problem of privacy-preserving personalized search as
Risk Profile Generalization, with itsNP-hardness proved.
We develop two simple but effective generalization algorithms, GreedyDP and GreedyIL,
to support runtime profiling. While the former tries to maximize the discriminating power (DP),
the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics,
GreedyIL outperforms GreedyDP significantly.
We provide an inexpensive mechanism for the client to decide whether to personalize a
query in UPS. This decision can be made before each runtime profiling to enhance the stability
of the search results while avoid the unnecessary exposure of the profile.
Advantages:
1. It enhances the stability of the search quality.
2. It avoids the unnecessary exposure of the user profile.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Architecture:
Enhanced
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
MODULES”
1. Profile-Based Personalization.
2. Privacy Protection in PWS System.
3. Generalizing User Profile.
4. Online Decision.
Modules Description
1. Profile-Based Personalization
This paper introduces an approach to personalize digital multimedia content based on
user profile information. For this, two main mechanisms were developed: a profile
generator that automatically creates user profiles representing the user preferences, and a
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
content-based recommendation algorithm that estimates the user's interest in unknown
content by matching her profile to metadata descriptions of the content. Both features are
integrated into a personalization system.
2. Privacy Protection in PWS System
We propose a PWS framework called UPS that can generalize profiles in for each
query according to user-specified privacy requirements. Two predictive metrics are
proposed to evaluate the privacy breach risk and the query utility for hierarchical user
profile. We develop two simple but effective generalization algorithms for user profiles
allowing for query-level customization using our proposed metrics. We also provide an
online prediction mechanism based on query utility for deciding whether to personalize a
query in UPS. Extensive experiments demonstrate the efficiency and effectiveness of our
framework.
3. Generalizing User Profile
The generalization process has to meet specific prerequisites to handle the user
profile. This is achieved by preprocessing the user profile. At first, the process initializes
the user profile by taking the indicated parent user profile into account. The process adds
the inherited properties to the properties of the local user profile. Thereafter the process
loads the data for the foreground and the background of the map according to the
described selection in the user profile.
Additionally, using references enables caching and is helpful when considering an
implementation in a production environment. The reference to the user profile can be
used as an identifier for already processed user profiles. It allows performing the
customization process once, but reusing the result multiple times. However, it has to be
made sure, that an update of the user profile is also propagated to the generalization
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
process. This requires specific update strategies, which check after a specific timeout or a
specific event, if the user profile has not changed yet. Additionally, as the generalization
process involves remote data services, which might be updated frequently, the cached
generalization results might become outdated. Thus selecting a specific caching strategy
requires careful analysis.
4. Online Decision
The profile-based personalization contributes little or even reduces the search
quality, while exposing the profile to a server would for sure risk the user’s privacy. To
address this problem, we develop an online mechanism to decide whether to personalize a
query. The basic idea is straightforward. if a distinct query is identified during
generalization, the entire runtime profiling will be aborted and the query will be sent to
the server without a user profile.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB (min)
Hard Disk - 20 GB
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql
 Database Connectivity : JDBC.
CONCLUSION
This paper presented a client-side privacy protection framework called UPS for
personalized web search. UPS could potentially be adopted by any PWS that captures user
profiles in a hierarchical taxonomy. The framework allowed users to specify customized privacy
requirements via the hierarchical profiles. In addition, UPS also performed online generalization
on user profiles to protect the personal privacy without compromising the search quality. We
proposed two greedy algorithms, namely GreedyDP and GreedyIL, for the online generalization.
Our experimental results revealed that UPS could achieve quality search results while preserving
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
user’s customized privacy requirements. The results also confirmed the effectiveness and
efficiency of our solution.
REFERENCES
[1] Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of Personalized
Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp. 581-590, 2007.
[2] J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated Analysis of
Interests and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in
Information Retrieval (SIGIR), pp. 449-456, 2005.
[3] M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,” Proc.
IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005.
[4] B. Tan, X. Shen, and C. Zhai, “Mining Long-Term Search History to Improve Search
Accuracy,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD),
2006.
[5] K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile
Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World Wide Web (WWW),
2004.
Scope:
To protect user privacy in profile-based PWS, researchers have to consider two
contradicting effects during the search process. On the one hand, they attempt to improve the
search quality with the personalization utility of the user profile. On the other hand, they need to
hide the privacy contents existing in the user profile to place the privacy risk under control. A
few previous studies , suggest that people are willing to compromise privacy if the
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
personalization by supplying user profile to the search engine yields better search quality. In an
ideal case, significant gain can be obtained by personalization at the expense of only a small (and
less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be
protected without compromising the personalized search quality. In general, there is a tradeoff
between the search quality and the level of privacy protection achieved from generalization.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)

More Related Content

What's hot

SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
nikhil421080
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Shakas Technologies
 
Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
Shakas Technologies
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
Editor IJMTER
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
Saurav Kumar
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
chennaijp
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
swathi78
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
Migrant Systems
 
G017415465
G017415465G017415465
G017415465
IOSR Journals
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web PersonalizationA Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
IDES Editor
 
Update cv khetrabasi new
Update cv khetrabasi newUpdate cv khetrabasi new
Update cv khetrabasi new
Khetrabasi Rout
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
Gayathri1317
 
Update cv khetrabasi new
Update cv khetrabasi newUpdate cv khetrabasi new
Update cv khetrabasi new
Khetrabasi Rout
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
EditorJST
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EngineSantosh Dawange
 

What's hot (20)

Personalized web search
Personalized web searchPersonalized web search
Personalized web search
 
Personalized Web Search
Personalized Web SearchPersonalized Web Search
Personalized Web Search
 
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
G017415465
G017415465G017415465
G017415465
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
 
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web PersonalizationA Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
 
Update cv khetrabasi new
Update cv khetrabasi newUpdate cv khetrabasi new
Update cv khetrabasi new
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
 
Update cv khetrabasi new
Update cv khetrabasi newUpdate cv khetrabasi new
Update cv khetrabasi new
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search Engine
 

Viewers also liked

Personalized search
Personalized searchPersonalized search
Personalized search
Toine Bogers
 
4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
Webdesigner Hyderabad
 
E2matrix
E2matrixE2matrix
E2matrix
Kaurharleen
 
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsFr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applications
CloudTechnologies
 
Feasibility analysis, project
Feasibility analysis, projectFeasibility analysis, project
Feasibility analysis, projectAliga Raju
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
Sagar Sane
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Datta Dharanikota
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
Rkrishna Mishra
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 

Viewers also liked (12)

Personalized search
Personalized searchPersonalized search
Personalized search
 
4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
 
E2matrix
E2matrixE2matrix
E2matrix
 
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsFr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applications
 
Feasibility analysis, project
Feasibility analysis, projectFeasibility analysis, project
Feasibility analysis, project
 
Data mining
Data miningData mining
Data mining
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Supporting privacy protection in personalized web search

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
IEEEMEMTECHSTUDENTSPROJECTS
 
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web SearchSupporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
IRJET Journal
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
Shivlal Mewada
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Personality Prediction with CV Analysis
Personality Prediction with CV AnalysisPersonality Prediction with CV Analysis
Personality Prediction with CV Analysis
IRJET Journal
 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
Adz91 Digital Ads Pvt Ltd
 
IRJET - Sentiment Analysis and Rumour Detection in Online Product Reviews
IRJET -  	  Sentiment Analysis and Rumour Detection in Online Product ReviewsIRJET -  	  Sentiment Analysis and Rumour Detection in Online Product Reviews
IRJET - Sentiment Analysis and Rumour Detection in Online Product Reviews
IRJET Journal
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
redpel dot com
 
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
IRJET Journal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
IRJET Journal
 
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine LearningEmployment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
IRJET Journal
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
ijmpict
 
Deriving concept based user profiles
Deriving concept based user profilesDeriving concept based user profiles
Deriving concept based user profiles
Shailaja Swami
 

Similar to Supporting privacy protection in personalized web search (20)

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
 
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web SearchSupporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
 
Personality Prediction with CV Analysis
Personality Prediction with CV AnalysisPersonality Prediction with CV Analysis
Personality Prediction with CV Analysis
 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
 
IRJET - Sentiment Analysis and Rumour Detection in Online Product Reviews
IRJET -  	  Sentiment Analysis and Rumour Detection in Online Product ReviewsIRJET -  	  Sentiment Analysis and Rumour Detection in Online Product Reviews
IRJET - Sentiment Analysis and Rumour Detection in Online Product Reviews
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine LearningEmployment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
Deriving concept based user profiles
Deriving concept based user profilesDeriving concept based user profiles
Deriving concept based user profiles
 

More from Adz91 Digital Ads Pvt Ltd

2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
Adz91 Digital Ads Pvt Ltd
 
Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering students
Adz91 Digital Ads Pvt Ltd
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 Digital Ads Pvt Ltd
 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentation
Adz91 Digital Ads Pvt Ltd
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
Adz91 Digital Ads Pvt Ltd
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
Adz91 Digital Ads Pvt Ltd
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
Adz91 Digital Ads Pvt Ltd
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
Adz91 Digital Ads Pvt Ltd
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
Adz91 Digital Ads Pvt Ltd
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
Adz91 Digital Ads Pvt Ltd
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
Adz91 Digital Ads Pvt Ltd
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
Adz91 Digital Ads Pvt Ltd
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Dealing with concept drifts in process mining
Dealing with concept drifts in process mining
Adz91 Digital Ads Pvt Ltd
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 

More from Adz91 Digital Ads Pvt Ltd (20)

2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
 
Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering students
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentation
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Dealing with concept drifts in process mining
Dealing with concept drifts in process mining
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
benykoy2024
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 

Supporting privacy protection in personalized web search

  • 1. Supporting Privacy Protection in Personalized Web Search ABSTRACT Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting userspecified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our framework. The experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of efficiency. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 2. Existing System The existing profile-based Personalized Web Search do not support runtime profiling. A user profile is typically generalized for only once offline, and used to personalize all queries from a same user indiscriminatingly. Such “one profile fits all” strategy certainly has drawbacks given the variety of queries. One evidence reported in is that profile-based personalization may not even help to improve the search quality for some ad hoc queries, though exposing user profile to a server has put the user’s privacy at risk. The existing methods do not take into account the customization of privacy requirements. This probably makes some user privacy to be overprotected while others insufficiently protected. For example, in, all the sensitive topics are detected using an absolute metric called surprisal based on the information theory, assuming that the interests with less user document support are more sensitive. However, this assumption can be doubted with a simple counterexample: If a user has a large number of documents about “sex,” the surprisal of this topic may lead to a conclusion that “sex” is very general and not sensitive, despite the truth which is opposite. Unfortunately, few prior work can effectively address individual privacy needs during the generalization. Many personalization techniques require iterative user interactions when creating personalized search results. They usually refine the search results with some metrics which require multiple user interactions, such as rank scoring, average rank, and so on. This paradigm is, however, infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive processing time for profiling. Thus, we need predictive metrics to measure the search quality and breach risk after personalization, without incurring iterative user interaction. Disadvantage: We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 3. All the sensitive topics are detected using an absolute metric called surprisal based on the information theory. Proposed System: We propose a privacy-preserving personalized web search framework UPS, which can generalize profiles for each query according to user-specified privacy requirements. Relying on the definition of two conflicting metrics, namely personalization utility and privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving personalized search as Risk Profile Generalization, with itsNP-hardness proved. We develop two simple but effective generalization algorithms, GreedyDP and GreedyIL, to support runtime profiling. While the former tries to maximize the discriminating power (DP), the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics, GreedyIL outperforms GreedyDP significantly. We provide an inexpensive mechanism for the client to decide whether to personalize a query in UPS. This decision can be made before each runtime profiling to enhance the stability of the search results while avoid the unnecessary exposure of the profile. Advantages: 1. It enhances the stability of the search quality. 2. It avoids the unnecessary exposure of the user profile. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 4. Architecture: Enhanced We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 5. MODULES” 1. Profile-Based Personalization. 2. Privacy Protection in PWS System. 3. Generalizing User Profile. 4. Online Decision. Modules Description 1. Profile-Based Personalization This paper introduces an approach to personalize digital multimedia content based on user profile information. For this, two main mechanisms were developed: a profile generator that automatically creates user profiles representing the user preferences, and a We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 6. content-based recommendation algorithm that estimates the user's interest in unknown content by matching her profile to metadata descriptions of the content. Both features are integrated into a personalization system. 2. Privacy Protection in PWS System We propose a PWS framework called UPS that can generalize profiles in for each query according to user-specified privacy requirements. Two predictive metrics are proposed to evaluate the privacy breach risk and the query utility for hierarchical user profile. We develop two simple but effective generalization algorithms for user profiles allowing for query-level customization using our proposed metrics. We also provide an online prediction mechanism based on query utility for deciding whether to personalize a query in UPS. Extensive experiments demonstrate the efficiency and effectiveness of our framework. 3. Generalizing User Profile The generalization process has to meet specific prerequisites to handle the user profile. This is achieved by preprocessing the user profile. At first, the process initializes the user profile by taking the indicated parent user profile into account. The process adds the inherited properties to the properties of the local user profile. Thereafter the process loads the data for the foreground and the background of the map according to the described selection in the user profile. Additionally, using references enables caching and is helpful when considering an implementation in a production environment. The reference to the user profile can be used as an identifier for already processed user profiles. It allows performing the customization process once, but reusing the result multiple times. However, it has to be made sure, that an update of the user profile is also propagated to the generalization We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 7. process. This requires specific update strategies, which check after a specific timeout or a specific event, if the user profile has not changed yet. Additionally, as the generalization process involves remote data services, which might be updated frequently, the cached generalization results might become outdated. Thus selecting a specific caching strategy requires careful analysis. 4. Online Decision The profile-based personalization contributes little or even reduces the search quality, while exposing the profile to a server would for sure risk the user’s privacy. To address this problem, we develop an online mechanism to decide whether to personalize a query. The basic idea is straightforward. if a distinct query is identified during generalization, the entire runtime profiling will be aborted and the query will be sent to the server without a user profile. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 8. Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC. CONCLUSION This paper presented a client-side privacy protection framework called UPS for personalized web search. UPS could potentially be adopted by any PWS that captures user profiles in a hierarchical taxonomy. The framework allowed users to specify customized privacy requirements via the hierarchical profiles. In addition, UPS also performed online generalization on user profiles to protect the personal privacy without compromising the search quality. We proposed two greedy algorithms, namely GreedyDP and GreedyIL, for the online generalization. Our experimental results revealed that UPS could achieve quality search results while preserving We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 9. user’s customized privacy requirements. The results also confirmed the effectiveness and efficiency of our solution. REFERENCES [1] Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of Personalized Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp. 581-590, 2007. [2] J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated Analysis of Interests and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR), pp. 449-456, 2005. [3] M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,” Proc. IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005. [4] B. Tan, X. Shen, and C. Zhai, “Mining Long-Term Search History to Improve Search Accuracy,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), 2006. [5] K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World Wide Web (WWW), 2004. Scope: To protect user privacy in profile-based PWS, researchers have to consider two contradicting effects during the search process. On the one hand, they attempt to improve the search quality with the personalization utility of the user profile. On the other hand, they need to hide the privacy contents existing in the user profile to place the privacy risk under control. A few previous studies , suggest that people are willing to compromise privacy if the We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 10. personalization by supplying user profile to the search engine yields better search quality. In an ideal case, significant gain can be obtained by personalization at the expense of only a small (and less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be protected without compromising the personalized search quality. In general, there is a tradeoff between the search quality and the level of privacy protection achieved from generalization. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)