Theses and Dissertations
Permanent URI for this collectionhttp://ir.daiict.ac.in/handle/123456789/1
Browse
2 results
Search Results
Item Open Access Scalable Privacy-Preserving Recommendation System(Dhirubhai Ambani Institute of Information and Communication Technology, 2022) Tamboli, Rushabh; Das, Manik LalRecommendation systems, which are used by e-business applications, play an essential role in our daily life. For example, companies like Amazon, Flipkart, YouTube use recommendation systems to generate customized recommendations from the user�s personal information. A personalized recommendation system�s primary purpose is to give users helpful suggestions on different things. The service provider has to access different kinds of user data in order to make suggestions, such as prior product buying history, demographic, and identifying details. Users, on the other hand, are wary about disclosing personal information since it may be readily abused by hostile third parties. To address this challenge, we propose a privacy-preserving recommendation system using homomorphic encryption, which is able to provide recommendations without revealing user rating information. Also, in this system, a service provider can use another service provider�s user rating database to improve the generated recommendation while protecting user�s privacy. The implementation of the proposed system on a publicly available database shows that the system is practical and achieves higher commendation accuracy.Item Open Access Security and Privacy concerns in Voice Assistants Devices(2021) Trivedi, Revant; Das, Manik LalVoice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing voice commands. Although it has many uses but there is a risk associated with it. The main concern with these devices is continuous listening. In order to provide a real time response, these devices keep their microphone on. Which compromises user’s privacy as well as security. Numerous approaches have been carried out but still it’s an issue which requires strong attention. In this work, we are focusing on how to avoid the continuous listening and how to protect user’s privacy. Adversaries target the Voice assistant devices when user is not aware or user is not around. They can collect the data, control the connected IoT devices, or can waste user’s resources. We present an approach that provides solution to all these problems. We propose a Jammer mechanism which can be controlled by the mobile phone. It jams the microphone whenever the user wants and protect user’s privacy as well as keep safe from unknown attacks. The jammer gets one more layer of protection by Bluetooth module, which does not let an attacker connect to the device.