Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: SEARCH ENGINES AND SEARCH LOGS ppt
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
SEARCH ENGINES AND SEARCH LOGS

[attachment=32881]

ABOUT THE PROJECT:

The project is developed in order to achieve privacy in publishing the search logs. Search engine companies usually store the details of the queries we type and the URLs that we click. This information is usually published for the users. The information should not affect any ones privacy. The project is developed such that the search logs are published which does not affect user’s privacy.

SCOPE OF THE PROJECT:

The scope of the project is to maintain privacy in publishing the search logs of the user’s search queries. These queries are presented to the user in a way that the user could understand the scenario easily and more over privacy of any user is not affected.

SEARCH ENGINES AND SEARCH LOGS:

Search engines nowadays provide us the best source of information. Almost any information can be easily obtained from search engines like Google, Yahoo, Bing, AOL, etc. Search engine companies not only provide us information but it also monitors our activity like, Queries issued, URLs Clicked, Files that we downloaded, etc. This information is obtained by User logins, Cookies or by IP Addresses. This information is called as search logs. These logs are used by the search engines for various purposes, such as for User-Specific Advertisements, Research Departments and Surveyors. But, Search engine companies are aware of not publishing the search logs on the website as it is, in order not to disclosesensitive information.

PRIVACY PRESERVING ALGORITHM:

In this project, we propose a novel algorithm called the ZEALOUS Algorithm which is analyzed by Korolova et al to maintain privacy in publishing the search logs. This algorithm provides comparably better privacy than the existing algorithms. The result of the algorithm is too designed so user-friendly to analyze a search log but also without leakage of any sensitive information

USERS OF THE SYSTEM:

Our project begins with three set of users, each of them should be logged in with a provided username and password to use the system.

1) User: A person who is authorized to issue search queries, retrieve relevant information, download files and to request the administrator for generating and viewing his/her histogram.
2) Publisher: A person who is authorized to write articles, post URLs of webpages and upload documents into the system.
3) Administrator: A person who is authorized to approve or disapprove the articles posted by the publisher. The histogram requests from user can also be approved or disapproved and posted to the specific users page by the administrator.