Achieving Privacy in Publishing Search logs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 1
Abstract
The “database of intentions,” collects by the search engine companies for the histories of their users search queries. These searchlogs are a gold mine for researchers. The Search engine companies, however, are wary of publishing search logs in order not to disclose sensitive information. In this paper, we are analysing algorithms for publishing frequent queries, keywords and clicks of a search log. Our evaluation includes the applications that use search logs for improving both search experience and search performance, and our results show that the ZEALOUS’ output is sufficient for these applications while achieving strong formal privacy guarantees. We are using two real applications from the information retrieval community: Index caching, as the representative application for search performance, and for the query substitution, as a representative application for search quality. For both applications, the sufficient statistics are histograms of keywords, queries, or query pairs.
Authors and Affiliations
D Srivalli
Challenges to Data Base Security – A Futuristic View
Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...
The Application of Model Predictive Control (MPC) to Fast Systems such as Autonomous Ground Vehicles (AGV)
Abstract: This paper investigates the application of Model Predictive Control (MPC) to fast systems such as Autonomous Ground Vehicles (AGV) or mobile robots. The control of Autonomous ground vehicles (AGV) is chal...
Multipath Routing in Wireless Sensor Networks: A Survey and Analysis
Abstract: Due to restricted communication range and high density of sensor nodes in wireless sensor network, forwarding packets is an important field of research in sensor networks. Nowadays, multipath routing appr...
Dissemination of Link State Information for Enhancing Security in Mobile Ad Hoc Networks
A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent...
Towards Accurate Estimation of Fingerprint Ridge Orientation Using BPNN and Ternarization
Accurate estimation of ridge orientation is a crucial step in fingerprint image enhancement because the performance of a minutiae extraction algorithm and matching heavily relies on the quality of the input fin...