1 / 4

Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation

Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation is an IEEE projects, here Cloud Technologies giving to information on Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation

Download Presentation

Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation Abstract Personalized Privacy: We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for all persons, with-out catering for their concrete needs. The consequence is that we may be offering insufficient protection to a subset of people, while applying excessive privacy control to another subset. Motivated by this, we present a new generalization framework based on the concept of personalized anonymity. Personalized recommendation has verified its use in improving the problem of information overload on the internet. Many users show that due to the concerns of personal privacy. Users disclose their personal information. Here, we propose to generate the group of fake preference profile. So as to cover up the user sensitive subjects, and thus protect user personal privacy in personalized recommendation. First, we present a client- based framework for user privacy protection, which requires not only no change to existing recommendation algorithms, but also no compromise to the recommendation accuracy. we introduce a privacy protection model, which formulates the two requirements that ideal fake preference profiles should satisfy: (1) the similarity of feature distribution, which measures the effectiveness of fake preference profiles to hide a genuine user preference profile; and (2) the exposure degree of sensitive subjects, which measures the effectiveness of fake preference profiles to cover up the sensitive subjects. EXISTING SYSTEM First, we present a client-based framework for user privacy protection, which requires not only no change to existing recommendation algorithms, but also no compromise to the recommendation accuracy. Second, based on the framework, we introduce a privacy protection model, which formulates the two requirements that ideal fake preference profiles should satisfy

  2. PROPOSED SYSTEM Finally, based on a subject repository of product classification, we present an implementation algorithm to well meet the privacy protection model. Both theoretical analysis and experimental evaluation demonstrate the effectiveness of our proposed approach. In order to protect personal privacy in personalized recommendation, many approaches have been proposed, specifically including: data obfuscation, data transformation, anonymization etc. (1) the basic idea of data obfuscation techniques is to use fake or general data to obfuscate the data related to the sensitive preferences contained in users’ preference profile. This kind of techniques might lead to poor recommendation accuracy due to its change to user preference profiles. (2) In data transformation techniques, users’ personal data need to be transformed e.g., using noise addition or data perturbation before being used for personalized recommendation. Architecture:

  3. SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB SOFTWARE REQUIREMENTS: Operating System : Windows Family Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS Web Server : Apache Tomcat 7.0/8.0 Database : My SQL 5.5 or Higher UML's : StarUml Java Version : JDK 1.7 or 1.8 Implemented by Development team : Cloud Technologies Website : http://www.cloudstechnologies.in/ Contact : 8121953811, 040-65511811

  4. About Cloud Technologies: Cloud Technologies is one of the best software development company. Which is providing IEEE, real time projects and training for M-Tech, B-Tech, ME, BE, BCA, MCA students and freshers in Hyderabad Ameerpet. Our aim is to ensure you receive the best commanding on subject.

More Related