Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search

被引:6
|
作者
Khan, Rafiullah [1 ]
Islam, Muhammad Arshad [1 ]
Ullah, Mohib [1 ]
Aleem, Muhammad [1 ]
Iqbal, Muhammad Azhar [1 ]
机构
[1] Capital Univ Sci & Technol, Islamabad 45750, Pakistan
关键词
Web Search Privacy; Health Privacy; Privacy Estimation Measure; SOCIAL NETWORKS;
D O I
10.1166/jmihi.2019.2709
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The increasing use of web search engines (WSEs) for searching healthcare information has resulted in a growing number of users posting personal health information online. A recent survey demonstrates that over 80% of patients use WSE to seek health information. However, WSE stores these user's queries to analyze user behavior, result ranking, personalization, targeted advertisements, and other activities. Since health-related queries contain privacy-sensitive information that may infringe users privacy. Therefore, privacy-preserving web search techniques such as anonymizing networks, profile obfuscation, private information retrieval (PIR) protocols etc. are used to ensure the users privacy. In this paper, we propose Privacy Exposure Measure (PEM), a technique that facilitates user to control his/her privacy exposure while using the PIR protocols. PEM assesses the similarity between the users profile and query before posting to WSE and assists the user in avoiding privacy exposure. The experiments demonstrate 37.2% difference between users' profile created through PEM-powered-PIR protocol and other usual users' profile. Moreover, PEM offers more privacy to the user even in case of machine-learning attack.
引用
收藏
页码:1196 / 1204
页数:9
相关论文
共 50 条
  • [31] Homomorphic Encryption for Privacy-Preserving Genome Sequences Search
    Oguchi, Masato
    Rohloff, Kurt
    Yamada, Yuki
    2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 7 - 12
  • [32] Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud
    Zhu, Xiaojie
    Ayday, Erman
    Vitenberg, Roman
    Veeraragavan, Narasimha Raghavan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2771 - 2788
  • [33] Privacy-preserving Collaborative Learning with Automatic Transformation Search
    Gao, Wei
    Guo, Shangwei
    Zhang, Tianwei
    Qiu, Han
    Wen, Yonggang
    Liu, Yang
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 114 - 123
  • [34] Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
    Liu, Hai
    Wu, Zhenqiang
    Zhou, Yihui
    Peng, Changgen
    Tian, Feng
    Lu, Laifeng
    APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [35] CoFeed: privacy-preserving Web search recommendation based on collaborative aggregation of interest feedback
    Felber, Pascal
    Kropf, Peter
    Leonini, Lorenzo
    Luu, Toan
    Rajman, Martin
    Riviere, Etienne
    Schiavoni, Valerio
    Valerio, Jose
    SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (10): : 1165 - 1184
  • [36] A Privacy-Preserving Health Data Aggregation Scheme
    Liu, Yining
    Liu, Gao
    Cheng, Chi
    Xia, Zhe
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (08): : 3852 - 3864
  • [37] Privacy-preserving heterogeneous health data sharing
    Mohammed, Noman
    Jiang, Xiaoqian
    Chen, Rui
    Fung, Benjamin C. M.
    Ohno-Machado, Lucila
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (03) : 462 - 469
  • [38] Privacy-preserving Activity and Health Monitoring on Databox
    Zhao, Yuchen
    Haddadi, Hamed
    Skillman, Severin
    Enshaeifar, Shirin
    Barnaghi, Payam
    PROCEEDINGS OF THE THIRD ACM INTERNATIONAL WORKSHOP ON EDGE SYSTEMS, ANALYTICS AND NETWORKING (EDGESYS'20), 2020, : 49 - 54
  • [39] Measuring Privacy and Utility in Privacy-Preserving Visualization
    Dasgupta, Aritra
    Chen, Min
    Kosara, Robert
    COMPUTER GRAPHICS FORUM, 2013, 32 (08) : 35 - 47
  • [40] A privacy-preserving group encryption scheme with identity exposure
    Wu, Chuan-Kun
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (05)