Skip Nav Destination
ASME Press Select Proceedings
International Conference on Electronics, Information and Communication Engineering (EICE 2012)
By
Garry Lee
Garry Lee
Information Engineering Research Institute
Search for other works by this author on:
ISBN:
9780791859971
No. of Pages:
1008
Publisher:
ASME Press
Publication date:
2012
eBook Chapter
113 Research on Privacy Preservation in Personalized Search
By
Yanguang Shen
,
Yanguang Shen
Colloge of Information and Electrical Engineering,
Hebei University of Engineering
, Handan, Hebei
, China
Search for other works by this author on:
Min Wang
,
Min Wang
Colloge of Information and Electrical Engineering,
Hebei University of Engineering
, Handan, Hebei
, China
Search for other works by this author on:
Yongjian Fan
Yongjian Fan
Colloge of Information and Electrical Engineering,
Hebei University of Engineering
, Handan, Hebei
, China
Information School,
Renmin University of China
, Beijing
, China
Search for other works by this author on:
Page Count:
4
-
Published:2012
Citation
Shen, Y, Wang, M, Gu, Y, & Fan, Y. "Research on Privacy Preservation in Personalized Search." International Conference on Electronics, Information and Communication Engineering (EICE 2012). Ed. Lee, G. ASME Press, 2012.
Download citation file:
In order to meet the needs of users' privacy preservation in personalized search, this paper proposes a ranking method of personalized search result for privacy preservation. Based on VSM (Vector Space Model), the method used secure dot-product computation to compute similarities in various search results. It aims at protecting users' privacy while improving the quality of personalized search service. The performance analysis result proves that the method can calculate faster and has lower communication overhead.
Topics:
Preservation
Abstract
Keywords
Introduction
Secure Multiparty Computation
Vector Space Model
Research on the Ranking Method for Privacy Preservation in Personalized
Search Results
The General Idea
Implementation Steps
Performance Analysis
Security Analysis
Communication Analysis
Time Complexity Analysis
Conclusions
Acknowledgments
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
An Efficient Approach Towards Accurate and Authentic Preservation of File Time Stamps
International Conference on Computer and Automation Engineering, 4th (ICCAE 2012)
A Clustering Algorithm in Mobile Sensor Network for Increase Lifetime and Coverage Preservation
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
Length Ratio Preserving Parameterization of Triangular 3D Meshes
International Conference on Future Computer and Communication, 3rd (ICFCC 2011)
Automatic Generation of Dancing Animation for Preserving Dance Heritages Based on 3D Motion Capture Technology
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
Related Articles
Translation of Cryobiological Techniques to Socially Economically Deprived Populations—Part 1: Cryogenic Preservation Strategies
J. Med. Devices (March,2020)
The Determination of the Thermal History in a One-Dimensional Freezing System by a Perturbation Method
J. Heat Transfer (May,1979)