SlideShare a Scribd company logo
SUPPORTING PRIVACY
PROTECTION IN
PERSONALIZED
WEB SEARCH
Lidan Shou, He Bai, Ke Chen, and Gang Chen
ABSTRACT
Personalized web search (PWS) has demonstrated its effectiveness in improving
the quality of various search services on the Internet. However, evidences show
that users’ reluctance to disclose their private information during search has
become a major barrier for the wide proliferation of PWS. We study privacy
protection in PWS applications that model user preferences as hierarchical user
profiles. We propose a PWS framework called UPS that can adaptively
generalize profiles by queries while respecting user specified privacy
requirements. Our runtime generalization aims at striking a balance between
two predictive metrics that evaluate the utility of personalization and the
privacy risk of exposing the generalized profile. We present two greedy
algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also
provide an online prediction mechanism for deciding whether personalizing a
query is beneficial. Extensive experiments demonstrate the effectiveness of our
framework. The experimental results also reveal that GreedyIL significantly
outperforms GreedyDP in terms of efficiency.
EXISTING SYSTEM
The existing profile-based Personalized Web Search do not support runtime profiling. A user profile is
typically generalized for only once offline, and used to personalize all queries from a same user
indiscriminatingly. Such “one profile fits all” strategy certainly has drawbacks given the variety of queries.
One evidence reported in is that profile-based personalization may not even help to improve the search
quality for some ad hoc queries, though exposing user profile to a server has put the user’s privacy at
risk.
The existing methods do not take into account the customization of privacy requirements. This
probably makes some user privacy to be overprotected while others insufficiently protected. For
example, in, all the sensitive topics are detected using an absolute metric called surprisal based on the
information theory, assuming that the interests with less user document support are more sensitive.
However, this assumption can be doubted with a simple counterexample: If a user has a large number
of documents about “sex,” the surprisal of this topic may lead to a conclusion that “sex” is very general
and not sensitive, despite the truth which is opposite. Unfortunately, few prior work can effectively
address individual privacy needs during the generalization.
Many personalization techniques require iterative user interactions when creating personalized
search results. They usually refine the search results with some metrics which require multiple user
interactions, such as rank scoring, average rank, and so on. This paradigm is, however, infeasible for
runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive
processing time for profiling. Thus, we need predictive metrics to measure the search quality and breach
risk after personalization, without incurring iterative user interaction.
DISADVANTAGES OF EXISTING SYSTEM
 All the sensitive topics are detected using an absolute metric
called surprisal based on the information theory.
PROPOSED SYSTEM
We propose a privacy-preserving personalized web search framework UPS,
which can generalize profiles for each query according to user-specified
privacy requirements. Relying on the definition of two conflicting metrics,
namely personalization utility and privacy risk, for hierarchical user profile, we
formulate the problem of privacy-preserving personalized search as Risk Profile
Generalization, with itsNP-hardness proved.
We develop two simple but effective generalization algorithms, GreedyDP
and GreedyIL, to support runtime profiling. While the former tries to maximize
the discriminating power (DP), the latter attempts to minimize the information
loss (IL). By exploiting a number of heuristics, GreedyIL outperforms GreedyDP
significantly.
We provide an inexpensive mechanism for the client to decide whether to
personalize a query in UPS. This decision can be made before each runtime
profiling to enhance the stability of the search results while avoid the
unnecessary exposure of the profile.
ADVANTAGES OF PROPOSED SYSTEM
 It enhances the stability of the search quality.
 It avoids the unnecessary exposure of the user profile.
ARCHITECTURE
ENHANCED ARCHITECTURE
MODULES
 Profile-Based Personalization
 Privacy Protection in PWS System
 Generalizing User Profile
 Online Decision
MODULE DESCRIPTION
Profile-Based Personalization
This paper introduces an approach to personalize digital
multimedia content based on user profile information. For this, two
main mechanisms were developed: a profile generator that
automatically creates user profiles representing the user
preferences, and a content-based recommendation algorithm that
estimates the user's interest in unknown content by matching her
profile to metadata descriptions of the content. Both features are
integrated into a personalization system.
 PRIVACY PROTECTION IN PWS
SYSTEM
We propose a PWS framework called UPS that can generalize
profiles in for each query according to user-specified privacy
requirements. Two predictive metrics are proposed to evaluate the
privacy breach risk and the query utility for hierarchical user profile.
We develop two simple but effective generalization algorithms for
user profiles allowing for query-level customization using our
proposed metrics. We also provide an online prediction mechanism
based on query utility for deciding whether to personalize a query
in UPS. Extensive experiments demonstrate the efficiency and
effectiveness of our framework.
 GENERALIZING USER PROFILE
The generalization process has to meet specific prerequisites to handle the user
profile. This is achieved by preprocessing the user profile. At first, the process initializes
the user profile by taking the indicated parent user profile into account. The process
adds the inherited properties to the properties of the local user profile. Thereafter the
process loads the data for the foreground and the background of the map
according to the described selection in the user profile.
Additionally, using references enables caching and is helpful when considering
an implementation in a production environment. The reference to the user profile
can be used as an identifier for already processed user profiles. It allows performing
the customization process once, but reusing the result multiple times. However, it has
to be made sure, that an update of the user profile is also propagated to the
generalization process. This requires specific update strategies, which check after a
specific timeout or a specific event, if the user profile has not changed yet.
Additionally, as the generalization process involves remote data services, which
might be updated frequently, the cached generalization results might become
outdated. Thus selecting a specific caching strategy requires careful analysis.
 ONLINE DECISION
The profile-based personalization contributes little or even reduces
the search quality, while exposing the profile to a server would for
sure risk the user’s privacy. To address this problem, we develop an
online mechanism to decide whether to personalize a query. The
basic idea is straightforward. if a distinct query is identified during
generalization, the entire runtime profiling will be aborted and the
query will be sent to the server without a user profile.
MINIMUM HARDWARE CONFIGURATION OF
THE PROPOSED SYSTEM
 Processor : Intel/AMD
 Speed : 1.1 GHz
 RAM : 1 GB
 Hard Disk : 20 GB
 Key Board : Standard Keyboard
 Mouse : Standard Mouse
 Monitor : SVGA/LCD
SOFTWARE CONFIGURATION OF
THE PROPOSED SYSTEM
 Operating System : Windows
 Technology : Java and J2EE
 Web Technologies : HTML, JavaScript, CSS
 IDE : Eclipse
 Web Server : Tomcat 6/7
 Tool kit : Android Phone
 Database : MySQL 5.5
 Java Version : JDK 1.6/1.7/1.8
REFERENCES
 Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of
Personalized Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp.
581-590, 2007.
 J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated
Analysis of Interests and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research
and Development in Information Retrieval (SIGIR), pp. 449-456, 2005.
 M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,”
Proc. IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005.
 B. Tan, X. Shen, and C. Zhai, “Mining Long-Term Search History to Improve Search
Accuracy,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining
(KDD), 2006.
 K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User
Profile Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World
Wide Web (WWW), 2004.

More Related Content

What's hot

1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...
RamaKrishnaReddyKona
 
Personalized Web Search
Personalized Web SearchPersonalized Web Search
Personalized Web Search
Thilina Thanthriwatta
 
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
nikhil421080
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Shakas Technologies
 
Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
Shakas Technologies
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
Saurav Kumar
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
Editor IJMTER
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
chennaijp
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
swathi78
 
G017415465
G017415465G017415465
G017415465
IOSR Journals
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
Gayathri1317
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search Engine
Santosh Dawange
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
IAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web PersonalizationA Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
IDES Editor
 
PMSE-Personalized mobile search engine
PMSE-Personalized mobile search enginePMSE-Personalized mobile search engine
PMSE-Personalized mobile search engine
Vasavi Reddy
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
IRJET Journal
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
IEEEFINALYEARPROJECTS
 
50120140502013
5012014050201350120140502013
50120140502013
IAEME Publication
 

What's hot (19)

1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...
 
Personalized Web Search
Personalized Web SearchPersonalized Web Search
Personalized Web Search
 
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
 
G017415465
G017415465G017415465
G017415465
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search Engine
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web PersonalizationA Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
 
PMSE-Personalized mobile search engine
PMSE-Personalized mobile search enginePMSE-Personalized mobile search engine
PMSE-Personalized mobile search engine
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
 
50120140502013
5012014050201350120140502013
50120140502013
 

Viewers also liked

Personalized search
Personalized searchPersonalized search
Personalized search
Toine Bogers
 
4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
Webdesigner Hyderabad
 
E2matrix
E2matrixE2matrix
E2matrix
Kaurharleen
 
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsFr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applications
CloudTechnologies
 
Data mining
Data miningData mining
Data mining
Samir Sabry
 
Search engines
Search enginesSearch engines
Search engines
Sahiba Khurana
 
Search Engine Powerpoint
Search Engine PowerpointSearch Engine Powerpoint
Search Engine Powerpoint
201014161
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
Sagar Sane
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
smj
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Datta Dharanikota
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
Rkrishna Mishra
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 

Viewers also liked (13)

Personalized search
Personalized searchPersonalized search
Personalized search
 
4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
 
E2matrix
E2matrixE2matrix
E2matrix
 
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsFr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applications
 
Data mining
Data miningData mining
Data mining
 
Search engines
Search enginesSearch engines
Search engines
 
Search Engine Powerpoint
Search Engine PowerpointSearch Engine Powerpoint
Search Engine Powerpoint
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Supporting privacy protection in personalized web search

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
IEEEMEMTECHSTUDENTSPROJECTS
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
RamaKrishnaReddyKona
 
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web SearchSupporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
IRJET Journal
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
Shivlal Mewada
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
IRJET Journal
 
phr
phrphr
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
Some Studies on Protection for the Hidden Attribute Based Signatures without ...Some Studies on Protection for the Hidden Attribute Based Signatures without ...
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
ijtsrd
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
ijmpict
 
Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
ijceronline
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
redpel dot com
 
50120140502013
5012014050201350120140502013
50120140502013
IAEME Publication
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
Papitha Velumani
 
Personality Prediction with CV Analysis
Personality Prediction with CV AnalysisPersonality Prediction with CV Analysis
Personality Prediction with CV Analysis
IRJET Journal
 
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search EngineJAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
IEEEGLOBALSOFTTECHNOLOGIES
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
Papitha Velumani
 

Similar to Supporting privacy protection in personalized web search (19)

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web SearchSupporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Supporting privacy protection in per...
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
phr
phrphr
phr
 
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
Some Studies on Protection for the Hidden Attribute Based Signatures without ...Some Studies on Protection for the Hidden Attribute Based Signatures without ...
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
50120140502013
5012014050201350120140502013
50120140502013
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
 
Personality Prediction with CV Analysis
Personality Prediction with CV AnalysisPersonality Prediction with CV Analysis
Personality Prediction with CV Analysis
 
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search EngineJAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
JAVA 2013 IEEE DATAMINING PROJECT PMSE A Personalized Mobile Search Engine
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
 

More from IGEEKS TECHNOLOGIES

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
IGEEKS TECHNOLOGIES
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
IGEEKS TECHNOLOGIES
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
IGEEKS TECHNOLOGIES
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
IGEEKS TECHNOLOGIES
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project List
IGEEKS TECHNOLOGIES
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titles
IGEEKS TECHNOLOGIES
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
IGEEKS TECHNOLOGIES
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
IGEEKS TECHNOLOGIES
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects Bangalore
IGEEKS TECHNOLOGIES
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangalore
IGEEKS TECHNOLOGIES
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
IGEEKS TECHNOLOGIES
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
IGEEKS TECHNOLOGIES
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
IGEEKS TECHNOLOGIES
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
IGEEKS TECHNOLOGIES
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 

More from IGEEKS TECHNOLOGIES (20)

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project List
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titles
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects Bangalore
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangalore
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 

Recently uploaded

Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Recently uploaded (20)

Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

Supporting privacy protection in personalized web search

  • 1. SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH Lidan Shou, He Bai, Ke Chen, and Gang Chen
  • 2. ABSTRACT Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our framework. The experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of efficiency.
  • 3. EXISTING SYSTEM The existing profile-based Personalized Web Search do not support runtime profiling. A user profile is typically generalized for only once offline, and used to personalize all queries from a same user indiscriminatingly. Such “one profile fits all” strategy certainly has drawbacks given the variety of queries. One evidence reported in is that profile-based personalization may not even help to improve the search quality for some ad hoc queries, though exposing user profile to a server has put the user’s privacy at risk. The existing methods do not take into account the customization of privacy requirements. This probably makes some user privacy to be overprotected while others insufficiently protected. For example, in, all the sensitive topics are detected using an absolute metric called surprisal based on the information theory, assuming that the interests with less user document support are more sensitive. However, this assumption can be doubted with a simple counterexample: If a user has a large number of documents about “sex,” the surprisal of this topic may lead to a conclusion that “sex” is very general and not sensitive, despite the truth which is opposite. Unfortunately, few prior work can effectively address individual privacy needs during the generalization. Many personalization techniques require iterative user interactions when creating personalized search results. They usually refine the search results with some metrics which require multiple user interactions, such as rank scoring, average rank, and so on. This paradigm is, however, infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive processing time for profiling. Thus, we need predictive metrics to measure the search quality and breach risk after personalization, without incurring iterative user interaction.
  • 4. DISADVANTAGES OF EXISTING SYSTEM  All the sensitive topics are detected using an absolute metric called surprisal based on the information theory.
  • 5. PROPOSED SYSTEM We propose a privacy-preserving personalized web search framework UPS, which can generalize profiles for each query according to user-specified privacy requirements. Relying on the definition of two conflicting metrics, namely personalization utility and privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving personalized search as Risk Profile Generalization, with itsNP-hardness proved. We develop two simple but effective generalization algorithms, GreedyDP and GreedyIL, to support runtime profiling. While the former tries to maximize the discriminating power (DP), the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics, GreedyIL outperforms GreedyDP significantly. We provide an inexpensive mechanism for the client to decide whether to personalize a query in UPS. This decision can be made before each runtime profiling to enhance the stability of the search results while avoid the unnecessary exposure of the profile.
  • 6. ADVANTAGES OF PROPOSED SYSTEM  It enhances the stability of the search quality.  It avoids the unnecessary exposure of the user profile.
  • 9. MODULES  Profile-Based Personalization  Privacy Protection in PWS System  Generalizing User Profile  Online Decision
  • 10. MODULE DESCRIPTION Profile-Based Personalization This paper introduces an approach to personalize digital multimedia content based on user profile information. For this, two main mechanisms were developed: a profile generator that automatically creates user profiles representing the user preferences, and a content-based recommendation algorithm that estimates the user's interest in unknown content by matching her profile to metadata descriptions of the content. Both features are integrated into a personalization system.
  • 11.  PRIVACY PROTECTION IN PWS SYSTEM We propose a PWS framework called UPS that can generalize profiles in for each query according to user-specified privacy requirements. Two predictive metrics are proposed to evaluate the privacy breach risk and the query utility for hierarchical user profile. We develop two simple but effective generalization algorithms for user profiles allowing for query-level customization using our proposed metrics. We also provide an online prediction mechanism based on query utility for deciding whether to personalize a query in UPS. Extensive experiments demonstrate the efficiency and effectiveness of our framework.
  • 12.  GENERALIZING USER PROFILE The generalization process has to meet specific prerequisites to handle the user profile. This is achieved by preprocessing the user profile. At first, the process initializes the user profile by taking the indicated parent user profile into account. The process adds the inherited properties to the properties of the local user profile. Thereafter the process loads the data for the foreground and the background of the map according to the described selection in the user profile. Additionally, using references enables caching and is helpful when considering an implementation in a production environment. The reference to the user profile can be used as an identifier for already processed user profiles. It allows performing the customization process once, but reusing the result multiple times. However, it has to be made sure, that an update of the user profile is also propagated to the generalization process. This requires specific update strategies, which check after a specific timeout or a specific event, if the user profile has not changed yet. Additionally, as the generalization process involves remote data services, which might be updated frequently, the cached generalization results might become outdated. Thus selecting a specific caching strategy requires careful analysis.
  • 13.  ONLINE DECISION The profile-based personalization contributes little or even reduces the search quality, while exposing the profile to a server would for sure risk the user’s privacy. To address this problem, we develop an online mechanism to decide whether to personalize a query. The basic idea is straightforward. if a distinct query is identified during generalization, the entire runtime profiling will be aborted and the query will be sent to the server without a user profile.
  • 14. MINIMUM HARDWARE CONFIGURATION OF THE PROPOSED SYSTEM  Processor : Intel/AMD  Speed : 1.1 GHz  RAM : 1 GB  Hard Disk : 20 GB  Key Board : Standard Keyboard  Mouse : Standard Mouse  Monitor : SVGA/LCD
  • 15. SOFTWARE CONFIGURATION OF THE PROPOSED SYSTEM  Operating System : Windows  Technology : Java and J2EE  Web Technologies : HTML, JavaScript, CSS  IDE : Eclipse  Web Server : Tomcat 6/7  Tool kit : Android Phone  Database : MySQL 5.5  Java Version : JDK 1.6/1.7/1.8
  • 16. REFERENCES  Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of Personalized Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp. 581-590, 2007.  J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated Analysis of Interests and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR), pp. 449-456, 2005.  M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,” Proc. IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005.  B. Tan, X. Shen, and C. Zhai, “Mining Long-Term Search History to Improve Search Accuracy,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD), 2006.  K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World Wide Web (WWW), 2004.