SlideShare uma empresa Scribd logo
1 de 11
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH 
ABSTRACT 
Personalized web search (PWS) has demonstrated its effectiveness in improving 
the quality of various search services on the Internet. However, evidences show 
that users’ reluctance to disclose their private information during search has 
become a major barrier for the wide proliferation of PWS. We study privacy 
protection in PWS applications that model user preferences as hierarchical user 
profiles. We propose a PWS framework called UPS that can adaptively generalize 
profiles by queries while respecting user specified privacy requirements. Our 
runtime generalization aims at striking a balance between two predictive metrics 
that evaluate the utility of personalization and the privacy risk of exposing the 
generalized profile. We present two greedy algorithms, namely GreedyDP and 
GreedyIL, for runtime generalization. We also provide an online prediction 
mechanism for deciding whether personalizing a query is beneficial. Extensive 
experiments demonstrate the effectiveness of our framework. The experimental 
results also reveal that GreedyIL significantly outperforms GreedyDP in terms of 
efficiency.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
INTRODUCTION 
The web search engine has long become the most important portal for ordinary 
people looking for useful information on the web. However, users might 
experience failure when search engines return irrelevant results that do not meet 
their real intentions. Such irrelevance is largely due to the enormous variety of 
users’ contexts and backgrounds, as well as the ambiguity of texts. Personalized 
web search (PWS) is a general category of search techniques aiming at providing 
better search results, which are tailored for individual user needs. As the expense, 
user information has to be collected and analyzed to figure out the user intention 
behind the issued query. 
The solutions to PWS can generally be categorized into two types 
 Click-log-based methods and 
 Profile-based methods 
Click-log-based methods 
 The click-log based methods are straightforward they simply impose bias to 
clicked pages in the user’s query history. 
 It can only work on repeated queries from the same user, which is a strong 
limitation confining its applicability.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Profile-based methods 
Profile-based methods can be potentially effective for almost all sorts of queries, 
but are reported to be unstable under some circumstances. 
Improve the search experience with complicated user-interest models generated 
from user profiling techniques. 
PWS has demonstrated more effectiveness in improving the quality of web search 
recently, with increasing usage of personal and behavior information to profile its 
users, which is usually gathered implicitly from query history, browsing history, 
click-through data bookmarks, user documents and so forth. 
PROBLEM DEFINITION 
To protect user privacy in profile-based PWS, researchers have to consider two 
contradicting effects during the search process. On the one hand, they attempt to 
improve the search quality with the personalization utility of the user profile. 
They need to hide the privacy contents existing in the user profile to place the 
privacy risk under control. Significant gain can be obtained by personalization at 
the expense of only a small (and less-sensitive) portion of the user profile, namely 
a generalized profile. Thus, user privacy can be protected without compromising 
the personalized search quality. In general, there is a tradeoff between the search 
quality and the level of privacy protection achieved from generalization.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Unfortunately, the previous works of privacy preserving PWS are far from 
optimal. 
EXISTING SYSTEM 
Profile based PWS 
 A user profile is typically generalized for only once offline, and used to 
personalize all queries from a same user indiscriminatingly. 
 Such “one profile fits all” strategy certainly has drawbacks given the variety 
of queries. 
 Profile-based personalization may not even help to improve the search 
quality for some ad hoc queries, though exposing user profile to a server 
has put the user’s privacy at risk. 
 A better approach is to make an online decision on whether to personalize 
the query and what to expose in the user profile at runtime. 
Customization of privacy requirements 
 This considers, all the sensitive topics are detected using an absolute metric 
called surprisal based on the information theory, assuming that the 
interests with less user document support are more sensitive. 
Iterative user interactions
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 They usually refine the search results with some metrics which require 
multiple user interactions, such as rank scoring, average rank, and so on. 
 This paradigm is, however, infeasible for runtime profiling, as it will not only 
pose too much risk of privacy breach, but also demand prohibitive 
processing time for profiling. 
 Thus, we need predictive metrics to measure the search quality and breach 
risk after personalization, without incurring iterative user interaction. 
Disadvantages 
 The existing profile-based PWS do not support runtime profiling. 
 The existing methods do not take into account the customization of privacy 
requirements. 
 Many personalization techniques require iterative user interactions when 
creating personalized search results. 
PROPOSED SYSTEM 
 To propose UPS (User customizable Privacy-preserving Search) framework, 
which is a privacy-preserving personalized web search framework, which 
can generalize profiles for each query according to user-specified privacy 
requirements.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 To develop two simple but effective generalization algorithms, GreedyDP 
and GreedyIL, to support runtime profiling. GreedyDP tries to maximize the 
discriminating power (DP), GreedyIL attempts to minimize the information 
loss (IL). 
 The framework assumes that the queries do not contain any sensitive 
information, and aims at protecting the privacy in individual user profiles 
while retaining their usefulness for PWS. 
 UPS consists of a nontrusty search engine server and a number of clients. 
Each client (user) accessing the search service trusts no one but himself/ 
herself. 
 The key component for privacy protection is an online profiler 
implemented as a search proxy running on the client machine itself. 
 The proxy maintains both the complete user profile, in a hierarchy of nodes 
with semantics, and the user-specified (customized) privacy requirements 
represented as a set of sensitive-nodes. 
 During the offline phase, a hierarchical user profile is constructed and 
customized with the user-specified privacy requirements. 
 The online phase handles queries as When a user issues a query qi on the 
client, the proxy generates a user profile in runtime in the light of query 
terms. The output of this step is a generalized user profile Gi satisfying the 
privacy requirements. The generalization process is guided by considering
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
two conflicting metrics, namely the personalization utility and the privacy 
risk, both defined for user profiles. 
 The query and the generalized user profile are sent together to the PWS 
server for personalized search. 
 The search results are personalized with the profile and delivered back to 
the query proxy. 
 Finally, the proxy either presents the raw results to the user, or reranks 
them with the complete user profile. 
Advantages 
 UPS provides runtime profiling, which in effect optimizes the 
personalization utility while respecting user’s privacy requirements; 
 Allows for customization of privacy needs; and 
 Does not require iterative user interaction. 
 Provides an inexpensive mechanism for the client to decide whether to 
personalize a query in UPS.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
LITERATURE SUMMARY 
Profile-Based Personalization 
 Many profile representations are available in the literature to facilitate 
different personalization strategies. Earlier techniques utilize term 
lists/vectors or bag of words to represent their profile. 
 However, most recent works build profiles in hierarchical structures due to 
their stronger descriptive ability, better scalability, and higher access 
efficiency. The majority of the hierarchical representations are constructed 
with existing weighted topic hierarchy/graph, such as ODP, Wikipedia and 
so on. 
 Another work builds the hierarchical profile automatically via term-frequency 
analysis on the user data. 
Privacy Protection in PWS System 
 Generally there are two classes of privacy protection problems for PWS. 
o One class includes those treat privacy as the identification of an 
individual. 
o The other includes those consider the sensitivity of the data, 
particularly the user profiles, exposed to the PWS server.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 Typical works in the literature of protecting user identifications (class one) 
try to solve the privacy problem on different levels, including the 
pseudoidentity, the group identity, no identity, and no personal 
information. Solution to the first level is proved to fragile. The third and 
fourth levels are impractical due to high cost in communication and 
cryptography. Therefore, the existing efforts focus on the second level. 
 The useless user profile (UUP) protocol is proposed to shuffle queries 
among a group of users who issue them. As a result any entity cannot 
profile a certain individual. 
 These works assume the existence of a trustworthy third-party anonymizer, 
which is not readily available over the Internet at large. 
 Viejo and Castell-a-Roca use legacy social networks instead of the third 
party to provide a distorted user profile to the web search engine. In the 
scheme, every user acts as a search agency of his or her neighbors. They 
can decide to submit the query on behalf of who issued it, or forward it to 
other neighbors. The shortcomings of current solutions in class one is the 
high cost introduced due to the collaboration and communication. 
 The solutions in class two do not require third-party assistance or 
collaborations between social network entries. 
 In these solutions, users only trust themselves and cannot tolerate the 
exposure of their complete profiles an anonymity server.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 Krause and Horvitz employ statistical techniques to learn a probabilistic 
model, and then use this model to generate the near-optimal partial 
profile. Limitation in this work is that it builds the user profile as a finite set 
of attributes, and the probabilistic model is trained through predefined 
frequent queries. These assumptions are impractical in the context of PWS. 
 Xu et al. proposed a privacy protection solution for PWS based on 
hierarchical profiles. Using a user-specified threshold, a generalized profile 
is obtained in effect as a rooted subtree of the complete profile. 
Unfortunately, this work does not address the query utility, which is crucial 
for the service quality of PWS. 
 Xiao and Tao proposed Privacy-Preserving Data Publishing (PPDP). A person 
can specify the degree of privacy protection for her/his sensitive values by 
specifying “guarding nodes” in the taxonomy of the sensitive attribute. 
 Teevan et al. collect a set of features of the query to classify queries by 
their click entropy. While these works are motivative in questioning 
whether to personalize or not to, they assume the availability of massive 
user query logs and user feedback.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Hardware requirements: 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
Software requirements: 
Operating System : Windows Family. 
Language : JDK 1.5 
Database : MySQL 5.0 
Tool : HeidiSQL 3.0

Mais conteúdo relacionado

Mais procurados

SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
nikhil421080
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
Editor IJMTER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web PersonalizationA Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
IDES Editor
 
Privacy preserving and obscure delicate data with collaborative tagging
Privacy preserving and obscure delicate data with collaborative taggingPrivacy preserving and obscure delicate data with collaborative tagging
Privacy preserving and obscure delicate data with collaborative tagging
eSAT Publishing House
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search Engine
Santosh Dawange
 

Mais procurados (20)

1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...
 
Personalized Web Search
Personalized Web SearchPersonalized Web Search
Personalized Web Search
 
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCHSUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
 
Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)Supporting privacy protection in personalized web search (1)
Supporting privacy protection in personalized web search (1)
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Secure Protection in Customized Web Search
Secure Protection in Customized Web SearchSecure Protection in Customized Web Search
Secure Protection in Customized Web Search
 
Personalized mobile search engine
Personalized mobile search enginePersonalized mobile search engine
Personalized mobile search engine
 
supporting privacy protection in personalized web search
supporting privacy protection in personalized web searchsupporting privacy protection in personalized web search
supporting privacy protection in personalized web search
 
JPJ1426 Supporting Privacy Protection in Personalized Web Search
JPJ1426  Supporting Privacy Protection in Personalized Web SearchJPJ1426  Supporting Privacy Protection in Personalized Web Search
JPJ1426 Supporting Privacy Protection in Personalized Web Search
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
G017415465
G017415465G017415465
G017415465
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web PersonalizationA Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization
 
50120140502013
5012014050201350120140502013
50120140502013
 
supporting privacy protection in pws
supporting privacy protection in pwssupporting privacy protection in pws
supporting privacy protection in pws
 
Privacy preserving and obscure delicate data with collaborative tagging
Privacy preserving and obscure delicate data with collaborative taggingPrivacy preserving and obscure delicate data with collaborative tagging
Privacy preserving and obscure delicate data with collaborative tagging
 
PMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search EnginePMSE:Personalized Mobile Search Engine
PMSE:Personalized Mobile Search Engine
 

Destaque

Destaque (20)

Modeling approaches for dc–dc converters with switched capacitors
Modeling approaches for dc–dc converters with switched capacitorsModeling approaches for dc–dc converters with switched capacitors
Modeling approaches for dc–dc converters with switched capacitors
 
Grid connected forward microinverter with primary-parallel secondary-series t...
Grid connected forward microinverter with primary-parallel secondary-series t...Grid connected forward microinverter with primary-parallel secondary-series t...
Grid connected forward microinverter with primary-parallel secondary-series t...
 
Swedish_Sales_Tender_System
Swedish_Sales_Tender_SystemSwedish_Sales_Tender_System
Swedish_Sales_Tender_System
 
Sara Bareilles website analysis
Sara Bareilles website analysisSara Bareilles website analysis
Sara Bareilles website analysis
 
A new railway power flow control system coupled with asymmetric double lc bra...
A new railway power flow control system coupled with asymmetric double lc bra...A new railway power flow control system coupled with asymmetric double lc bra...
A new railway power flow control system coupled with asymmetric double lc bra...
 
The impact of api change and fault-proneness on the user ratings of android ...
The impact of api change  and fault-proneness on the user ratings of android ...The impact of api change  and fault-proneness on the user ratings of android ...
The impact of api change and fault-proneness on the user ratings of android ...
 
Ca co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systemsCa co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systems
 
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
 
Efficient filtering algorithms for location aware publish-subscribe
Efficient filtering algorithms for location aware publish-subscribeEfficient filtering algorithms for location aware publish-subscribe
Efficient filtering algorithms for location aware publish-subscribe
 
Wave 2 - Mobility | UM | Social Media Tracker
Wave 2  - Mobility | UM | Social Media TrackerWave 2  - Mobility | UM | Social Media Tracker
Wave 2 - Mobility | UM | Social Media Tracker
 
A novel control scheme of quasi resonant valley-switching for high-power-fact...
A novel control scheme of quasi resonant valley-switching for high-power-fact...A novel control scheme of quasi resonant valley-switching for high-power-fact...
A novel control scheme of quasi resonant valley-switching for high-power-fact...
 
Reduced capacity smart charger for electric vehicles on single-phase three-wi...
Reduced capacity smart charger for electric vehicles on single-phase three-wi...Reduced capacity smart charger for electric vehicles on single-phase three-wi...
Reduced capacity smart charger for electric vehicles on single-phase three-wi...
 
Wave 7 - Cracking the Social Code
Wave 7 - Cracking the Social CodeWave 7 - Cracking the Social Code
Wave 7 - Cracking the Social Code
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
 
Steady state analysis of a zvs bidirectional isolated three phase dc-dc conve...
Steady state analysis of a zvs bidirectional isolated three phase dc-dc conve...Steady state analysis of a zvs bidirectional isolated three phase dc-dc conve...
Steady state analysis of a zvs bidirectional isolated three phase dc-dc conve...
 
A novel wall switched step-dimming concept in led lighting systems using pfc ...
A novel wall switched step-dimming concept in led lighting systems using pfc ...A novel wall switched step-dimming concept in led lighting systems using pfc ...
A novel wall switched step-dimming concept in led lighting systems using pfc ...
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Video dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networksVideo dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networks
 
Reliability evaluation of conventional and interleaved dc–dc boost converters
Reliability evaluation of conventional and interleaved dc–dc boost convertersReliability evaluation of conventional and interleaved dc–dc boost converters
Reliability evaluation of conventional and interleaved dc–dc boost converters
 

Semelhante a Supporting privacy protection in personalized web search

Iaetsd web personalization a general survey
Iaetsd web personalization a general surveyIaetsd web personalization a general survey
Iaetsd web personalization a general survey
Iaetsd Iaetsd
 

Semelhante a Supporting privacy protection in personalized web search (20)

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
 
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
2014 IEEE DOTNET DATA MINING PROJECT Supporting privacy-protection-in-persona...
 
Dynamic query forms for database queries
Dynamic query forms for database queriesDynamic query forms for database queries
Dynamic query forms for database queries
 
Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Secure spatial top k query processing via untrusted location-based service pr...
Secure spatial top k query processing via untrusted location-based service pr...Secure spatial top k query processing via untrusted location-based service pr...
Secure spatial top k query processing via untrusted location-based service pr...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
I1037075
I1037075I1037075
I1037075
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...
 
Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
 
accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...
 
User-Tailored Privacy
User-Tailored PrivacyUser-Tailored Privacy
User-Tailored Privacy
 
EaZSearch
EaZSearch EaZSearch
EaZSearch
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
PRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGEPRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGE
 
Iaetsd web personalization a general survey
Iaetsd web personalization a general surveyIaetsd web personalization a general survey
Iaetsd web personalization a general survey
 

Mais de LeMeniz Infotech

Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 

Mais de LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Supporting privacy protection in personalized web search

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH ABSTRACT Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our framework. The experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of efficiency.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts INTRODUCTION The web search engine has long become the most important portal for ordinary people looking for useful information on the web. However, users might experience failure when search engines return irrelevant results that do not meet their real intentions. Such irrelevance is largely due to the enormous variety of users’ contexts and backgrounds, as well as the ambiguity of texts. Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are tailored for individual user needs. As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query. The solutions to PWS can generally be categorized into two types  Click-log-based methods and  Profile-based methods Click-log-based methods  The click-log based methods are straightforward they simply impose bias to clicked pages in the user’s query history.  It can only work on repeated queries from the same user, which is a strong limitation confining its applicability.
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Profile-based methods Profile-based methods can be potentially effective for almost all sorts of queries, but are reported to be unstable under some circumstances. Improve the search experience with complicated user-interest models generated from user profiling techniques. PWS has demonstrated more effectiveness in improving the quality of web search recently, with increasing usage of personal and behavior information to profile its users, which is usually gathered implicitly from query history, browsing history, click-through data bookmarks, user documents and so forth. PROBLEM DEFINITION To protect user privacy in profile-based PWS, researchers have to consider two contradicting effects during the search process. On the one hand, they attempt to improve the search quality with the personalization utility of the user profile. They need to hide the privacy contents existing in the user profile to place the privacy risk under control. Significant gain can be obtained by personalization at the expense of only a small (and less-sensitive) portion of the user profile, namely a generalized profile. Thus, user privacy can be protected without compromising the personalized search quality. In general, there is a tradeoff between the search quality and the level of privacy protection achieved from generalization.
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Unfortunately, the previous works of privacy preserving PWS are far from optimal. EXISTING SYSTEM Profile based PWS  A user profile is typically generalized for only once offline, and used to personalize all queries from a same user indiscriminatingly.  Such “one profile fits all” strategy certainly has drawbacks given the variety of queries.  Profile-based personalization may not even help to improve the search quality for some ad hoc queries, though exposing user profile to a server has put the user’s privacy at risk.  A better approach is to make an online decision on whether to personalize the query and what to expose in the user profile at runtime. Customization of privacy requirements  This considers, all the sensitive topics are detected using an absolute metric called surprisal based on the information theory, assuming that the interests with less user document support are more sensitive. Iterative user interactions
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  They usually refine the search results with some metrics which require multiple user interactions, such as rank scoring, average rank, and so on.  This paradigm is, however, infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive processing time for profiling.  Thus, we need predictive metrics to measure the search quality and breach risk after personalization, without incurring iterative user interaction. Disadvantages  The existing profile-based PWS do not support runtime profiling.  The existing methods do not take into account the customization of privacy requirements.  Many personalization techniques require iterative user interactions when creating personalized search results. PROPOSED SYSTEM  To propose UPS (User customizable Privacy-preserving Search) framework, which is a privacy-preserving personalized web search framework, which can generalize profiles for each query according to user-specified privacy requirements.
  • 6. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  To develop two simple but effective generalization algorithms, GreedyDP and GreedyIL, to support runtime profiling. GreedyDP tries to maximize the discriminating power (DP), GreedyIL attempts to minimize the information loss (IL).  The framework assumes that the queries do not contain any sensitive information, and aims at protecting the privacy in individual user profiles while retaining their usefulness for PWS.  UPS consists of a nontrusty search engine server and a number of clients. Each client (user) accessing the search service trusts no one but himself/ herself.  The key component for privacy protection is an online profiler implemented as a search proxy running on the client machine itself.  The proxy maintains both the complete user profile, in a hierarchy of nodes with semantics, and the user-specified (customized) privacy requirements represented as a set of sensitive-nodes.  During the offline phase, a hierarchical user profile is constructed and customized with the user-specified privacy requirements.  The online phase handles queries as When a user issues a query qi on the client, the proxy generates a user profile in runtime in the light of query terms. The output of this step is a generalized user profile Gi satisfying the privacy requirements. The generalization process is guided by considering
  • 7. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts two conflicting metrics, namely the personalization utility and the privacy risk, both defined for user profiles.  The query and the generalized user profile are sent together to the PWS server for personalized search.  The search results are personalized with the profile and delivered back to the query proxy.  Finally, the proxy either presents the raw results to the user, or reranks them with the complete user profile. Advantages  UPS provides runtime profiling, which in effect optimizes the personalization utility while respecting user’s privacy requirements;  Allows for customization of privacy needs; and  Does not require iterative user interaction.  Provides an inexpensive mechanism for the client to decide whether to personalize a query in UPS.
  • 8. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts LITERATURE SUMMARY Profile-Based Personalization  Many profile representations are available in the literature to facilitate different personalization strategies. Earlier techniques utilize term lists/vectors or bag of words to represent their profile.  However, most recent works build profiles in hierarchical structures due to their stronger descriptive ability, better scalability, and higher access efficiency. The majority of the hierarchical representations are constructed with existing weighted topic hierarchy/graph, such as ODP, Wikipedia and so on.  Another work builds the hierarchical profile automatically via term-frequency analysis on the user data. Privacy Protection in PWS System  Generally there are two classes of privacy protection problems for PWS. o One class includes those treat privacy as the identification of an individual. o The other includes those consider the sensitivity of the data, particularly the user profiles, exposed to the PWS server.
  • 9. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  Typical works in the literature of protecting user identifications (class one) try to solve the privacy problem on different levels, including the pseudoidentity, the group identity, no identity, and no personal information. Solution to the first level is proved to fragile. The third and fourth levels are impractical due to high cost in communication and cryptography. Therefore, the existing efforts focus on the second level.  The useless user profile (UUP) protocol is proposed to shuffle queries among a group of users who issue them. As a result any entity cannot profile a certain individual.  These works assume the existence of a trustworthy third-party anonymizer, which is not readily available over the Internet at large.  Viejo and Castell-a-Roca use legacy social networks instead of the third party to provide a distorted user profile to the web search engine. In the scheme, every user acts as a search agency of his or her neighbors. They can decide to submit the query on behalf of who issued it, or forward it to other neighbors. The shortcomings of current solutions in class one is the high cost introduced due to the collaboration and communication.  The solutions in class two do not require third-party assistance or collaborations between social network entries.  In these solutions, users only trust themselves and cannot tolerate the exposure of their complete profiles an anonymity server.
  • 10. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  Krause and Horvitz employ statistical techniques to learn a probabilistic model, and then use this model to generate the near-optimal partial profile. Limitation in this work is that it builds the user profile as a finite set of attributes, and the probabilistic model is trained through predefined frequent queries. These assumptions are impractical in the context of PWS.  Xu et al. proposed a privacy protection solution for PWS based on hierarchical profiles. Using a user-specified threshold, a generalized profile is obtained in effect as a rooted subtree of the complete profile. Unfortunately, this work does not address the query utility, which is crucial for the service quality of PWS.  Xiao and Tao proposed Privacy-Preserving Data Publishing (PPDP). A person can specify the degree of privacy protection for her/his sensitive values by specifying “guarding nodes” in the taxonomy of the sensitive attribute.  Teevan et al. collect a set of features of the query to classify queries by their click entropy. While these works are motivative in questioning whether to personalize or not to, they assume the availability of massive user query logs and user feedback.
  • 11. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Hardware requirements: Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. Software requirements: Operating System : Windows Family. Language : JDK 1.5 Database : MySQL 5.0 Tool : HeidiSQL 3.0