Online advertising: Analysis of privacy threats and protection approaches

被引:57
|
作者
Estrada-Jimenez, Jose [1 ]
Parra-Arnau, Javier [2 ]
Rodriguez-Hoyos, Ana [1 ]
Forne, Jordi [3 ]
机构
[1] EPN, Dept Elect Telecomunicac & Redes Informac, E-11253 Quito, Ecuador
[2] Univ Rovira & Virgili URV, Dept Comp Sci & Math, E-08034 Tarragona, Spain
[3] UPC, Dept Telemat Engn, C Jordi Girona 1-3, E-08034 Barcelona, Spain
基金
欧盟地平线“2020”;
关键词
Online advertising; Web tracking; User profiling; Privacy risks;
D O I
10.1016/j.comcom.2016.12.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online advertising, the pillar of the "free" content on the Web, has revolutionized the marketing business in recent years by creating a myriad of new opportunities for advertisers to reach potential customers. The current advertising model builds upon an intricate infrastructure composed of a variety of intermediary entities and technologies whose main aim is to deliver personalized ads. For this purpose, a wealth of user data is collected, aggregated, processed and traded behind the scenes at an unprecedented rate. Despite the enormous value of online advertising, however, the intrusiveness and ubiquity of these practices prompt serious privacy concerns. This article surveys the online advertising infrastructure and its supporting technologies, and presents a thorough overview of the underlying privacy risks and the solutions that may mitigate them. We first analyze the threats and potential privacy attackers in this scenario of online advertising. In particular, we examine the main components of the advertising infrastructure in terms of tracking capabilities, data collection, aggregation level and privacy risk, and overview the tracking and data-sharing technologies employed by these components. Then, we conduct a comprehensive survey of the most relevant privacy mechanisms, and classify and compare them on the basis of their privacy guarantees and impact on the Web. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:32 / 51
页数:20
相关论文
共 50 条
  • [21] Growing Security and Privacy Threats Inspire New Approaches
    Edwards, John
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2019, 36 (01) : 13 - 16
  • [22] Anatomization and Protection of Mobile Apps' Location Privacy Threats
    Fawaz, Kassem
    Feng, Huan
    Shin, Kang G.
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 753 - 768
  • [23] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05):
  • [24] Consumers' protection of online privacy and identity
    Milne, GR
    Rohm, AJ
    Bahl, S
    [J]. JOURNAL OF CONSUMER AFFAIRS, 2004, 38 (02) : 217 - 232
  • [25] Panel: Privacy Protection in Online Multimedia
    Lu, Yung-Hsiang
    Cavallaro, Andrea
    Crump, Catherine
    Friedland, Gerald
    Winstein, Keith
    [J]. PROCEEDINGS OF THE 2017 ACM MULTIMEDIA CONFERENCE (MM'17), 2017, : 457 - 459
  • [26] ONLINE PRIVACY PROTECTION IN REVENGE PORN
    Farranha Santana, Ana Claudia
    Lopes Espineira Lemos, Amanda Nunes
    Nader Simoes, Juliana Thomazini
    [J]. QUAESTIO IURIS, 2019, 12 (04): : 111 - 130
  • [27] Capturing Performance and Privacy by Assembling Avengers of Online Advertising
    Kim, Taehee
    Baek, Seungyun
    Jeon, Taehyeon
    Jung, Hojin
    Kim, Joonhong
    Lee, Taeho
    [J]. PROCEEDINGS OF WORKSHOP ON THE RECSYS CHALLENGE 2023, RECSYSCHALLENGE 2023, 2023, : 28 - 32
  • [28] Perceived quality of privacy protection regulations and online privacy concern
    Skrinjaric, Bruno
    Budak, Jelena
    Rajh, Edo
    [J]. ECONOMIC RESEARCH-EKONOMSKA ISTRAZIVANJA, 2019, 32 (01): : 982 - 1000
  • [29] Privacy Threats Related to User Profiling in Online Social Networks
    Erlandsson, Fredrik
    Boldt, Martin
    Johnson, Henric
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 838 - 842
  • [30] Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors
    Chen, Hongliang
    Beaudoin, Christopher E.
    Hong, Traci
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 70 : 291 - 302