Downloads: 125
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015
Implementing the Supporting Privacy Protection in Customized net Search
N. Rajendran [2] | N. Prakash [4]
Abstract: Personalized internet search (PWS) has in contestible its effectiveness in up the standard of varied search services on the net. However, evidences show that users reluctance to disclose their personal data throughout search has become a significant barrier for the wide proliferation of PWS. we have a tendency to study privacy protection in PWS applications that model user preferences as hierarchic user profiles. we have a tendency to propose a PWS framework known as UPS which will adaptively generalize profiles by queries whereas respecting user specified privacy necessities. Our runtime generalization aims at hanging a balance between 2 prophetic metrics that judge the utility of personalization and also the privacy risk of exposing the neralized profile. we have a tendency to gift 2 greedy algorithms, specifically GreedyDP and GreedyIL, for runtime generalization. we have a tendency to additionally give an internet prediction mechanism for deciding whether or not personalizing a question is helpful. intensive experiments demonstrate the effectiveness of our framework. The experimental results ditionally reveal that GreedyIL considerably outperforms GreedyDP in terms of potency.
Keywords: Privacy protection, personalized web search, utility, risk, profile
Edition: Volume 4 Issue 10, October 2015,
Pages: 858 - 863
Similar Articles with Keyword 'Privacy protection'
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T | Dr.V. Kavitha
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan [2] | Mansi Bhonsle [5]