Visualizing Chrome Browser History using Exploratory

Web browsers are at the core of online user experience, enabling a wide range of web applications like audios, videos, games, software, etc. It is very interesting from an individual point of view to discover patterns from web browsing history.Web browsers collect a history of the user’s activity, and this history data can be processed by browser add-ons using the browser’s extension API.Add-ons may slow down your web browser. Add-ons may transfer into malwares. Extensions are vulnerable in nature. It may sometimes install third party applications. we are using chrome sign in feature instead of using extensions. It is fast and protects you with username and password. Exploratory software is used to visualize, which is free for students. Result: The browsing data is collected using a Gmail account and the data is visualized using exploratory software. Hence the data can be protected and used by the owner of the Gmail account. It is also possible to find the relation between the websites and to create a network between them using ucinet.


INTRODUCTION:
In computing, the web browsing history refers to the list of web pages a user has visited recently and associated data such as page title and time of visit which is recorded by web browser software as standard for a certain period of time. Web browser software does this in order to provide the user with a back button and a history list to go back to pages they have visited previously as well as displaying visited links rather than relying on the user to remember where they have been on the web. In addition to the web browser software itself, third-party services can also record a user's web browsing history (completely or partially). For example, in google web history, the clicks of registered users are recorded and stored in individual user histories, each of which are browsable and searchable by that user (this is in addition to the click-tracking Google records for its own internal purposes, such as advertising click tracking). If the user installs the google toolbar, all pages that the user visits while logged into Google on that computer may be recorded as well. A potential benefit to the user is that they can review and search through all of their web browsing history on any computer, but this can have privacy implications. Web browsing history is not published anywhere publicly by default, whether a user uses their own browser's history functionality or a third-party service, because this would have huge negative privacy implications and would reflect negatively on the reputation of a software or service provider who did such a thing. If a user has not disabled ("paused") Google's collection of Web History, and has a Google Account which they use, choosing a strong password for that account is International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume -1 | Issue -5 | July-Aug 2017 Page: 693 important to prevent hackers gaining access to confidential data.

EXISTING SYSTEM:
Google chrome extension is used to collect the data of browsing history. Once the extension is installed an icon appears right next t the address bar. If the user clicks the icon, it will extract the web history of the user and forms the weighted network. The user can see clusters of websites and could navigate to a website by clicking on the region allotted to it in tree map. The network of the web history is rebuilt with the latest data every time the user refreshes the page. Note that the clusters of most frequently visited websites tend to be placed towards the center of the bounding box making it easier for the user to navigate to those pages.

PROPOSED SYSTEM:
Signing in to Chrome brings your bookmarks, history, and other settings to all your devices. Anything you update on one device instantly updates everywhere else, and your Chrome stuff is safe in case anything happens to your computer. It's your web. Take it with you. So it is easy and safe to save data. We can also able to collect data from google using takeout google feature. Collect the data and save it in system. Upload the collected data in the exploratory software to visualize the browsing history. It is possible to create a network from the browsing history data using ucinet software.

METHODOLOGY:
Sign in to chrome Download browser history Upload it in exploratory Visualizing the data Generate csv file

EGO NETWORK:
Ego networks consist of a focal node ("ego") and the nodes to whom ego is directly connected to (these are called "alters") plus the ties, if any, among the alters. Of course, each alter in an ego network has his/her ownego network, and all ego networks interlock to form the human social network.  In graph theory, Betweeness centrality is a measure of centrality in a graph based on shortest paths. Betweeness can be calculated using ucinet software.