A PROFILE BASED USER CUSTOMIZABLE PRIVACY PRESERVING WEB SEARCH

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 3, Issue 1, No 1, 2015.

Copyright: All Rights Reserved ©2015

Year of Publication: 2015

Author: M.Malik,S.P.Ramya,K.Nivetha

Reference:IJCS-073

View PDF Format

Abstract

In image retrieval search engine, the images can be retrieved based on the text or content. The existing image retrieval which classifies based on the click through logs may plays a vital role for effective search results. The user satisfaction can be obtained through the user click sequence. From the click sequence, the feedback sessions are calculated and produce effective search results. Thus the results show only the related results, but the users need the related and relevant data results. For this, the novel algorithm may propose to obtain the effective relevant and related search results based on both the click through logs and personalized web search. The personal profile added to the system to get the effective search results that are based on both these two techniques. After that the privacy protection has been implemented to avoid the data leakage when the system use protected details for searching. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. The new system presents two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. The system proposes a Cluster-Based SVM (CB-SVM) method to overcome the problems obtained with the SVM Classifier and also it can be tested with the Big Data Applications. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. The experimental results show the effectiveness of the novel algorithm.

References

[1] C. Lakshmi Devasena, T.Sumathi, Dr. M. Hemalatha, “An Experiential Survey on Image Mining Tools, Techniques and Applications” International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 3 Mar 2011. [2] C. Ordonez and E. Omiecinski, “Image Mining: A New Approach for Data Mining”, 1998. [3] J. Han and M. Kamber, “Data Mining: Concepts and Techniques”, 2/E, Morgan Kaufmann Publication, 2006. [4] C.-K Huang, L.-F Chien, and Y.-J Oyang, “Relevant Term Suggestion in Interactive Web Search Based on Contextual Information in Query Session Logs,” J. Am. Soc. for Information Science and Technology, vol. 54, no. 7, pp. 638-649, 2003. [5] S. Beitzel, E. Jensen, A. Chowdhury, and O. Frieder, “Varying Approaches to Topical Web Query Classification,” Proc. 30th Ann. Int’l ACM SIGIR Conf. Research and Development (SIGIR ’07), pp. 783-784, 2007. [6] Lu Z, Zha H, Yang X and Zheng Z, “A New Algorithm for Inferring User Search Goals with Feedback Sessions”, IEEE. Trans. on Knowledge and Data Engineering, vol. 25, no.3, pp.502-514, 2013. [7] Wnag X, Liu K and Tang X,”Web Image Re-ranking using query specific semantic signatures”,IEEE trans. on Pattern Analysis and Machine Intelligence, vol. 36, no.4, 2014. [8] Shou L, Bai H, Chen K and Chen G,”Supporting privacy protection in personalized web search”, IEEE Trans. on Knowledge and Data Engineering, vol 26, no.2, 2014.


Keywords

Image Retrieval, click through logs, Cluster Based SVM Classifier, data leakage.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog