Building Privacy-Preserving Search Engine Query Logs for Data Monetization

被引:0
|
作者
Bondia-Barcelo, Julio [1 ]
Castella-Roca, Jordi [1 ]
Viejo, Alexandre [1 ]
机构
[1] Univ Rovira & Virgili, UNESCO, Dept Engn Informat & Matemat, Chair Data Privacy, Av Paisos Catalans 26, E-43007 Tarragona, Spain
关键词
ANONYMIZATION;
D O I
10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web Search Engines (WSEs) keep the record of the queries sent by their users in files named query logs. This kind of data is mainly used to improve the user experience by means of personalizing search results, auto-completing search terms, correcting spelling mistakes, etc. On the other hand, the companies that offer WSE services can also sell this data to obtain economic benefits; this is known as data monetization. Nevertheless, a lot of sensitive data from individuals can be inferred from their past queries (e.g. religion views, sexual preferences, full name, etc.); therefore, the uncontrolled disclosure of query logs may represent a serious privacy risk to the individuals who have participated in their generation. In order to prevent such a dangerous situation, query logs must be anonymized to break the link between any piece of sensitive data and its legitimate owner. This paper proposes a system that allows WSEs to compile privacy-preserving query logs that may be monetized. Well known WSEs such as Google receive, in average, 40000 queries per second, therefore, the proposed scheme has been designed to process queries as fast as possible and in a way that the privacy of the individuals is preserved but the data utility of the anonymized query logs remains maximized.
引用
收藏
页码:390 / 397
页数:8
相关论文
共 50 条
  • [21] Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Choo, Kim-Kwang Raymond
    Meng, Xiangdong
    Deng, Robert H.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) : 13603 - 13616
  • [22] An efficient privacy-preserving data query and dissemination scheme in vehicular cloud
    Hu, Peng
    Wang, Yongli
    Xiao, Gang
    Zhou, Junlong
    Gong, Bei
    Wang, Yongjian
    PERVASIVE AND MOBILE COMPUTING, 2020, 65
  • [23] PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data
    Yang, Yaxi
    Weng, Jian
    Tong, Yao
    Liu, Jia-Nan
    Wu, Zhenghao
    Zhang, Leo Yu
    Yang, Anjia
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 961 - 974
  • [24] VPRQ: Verifiable and privacy-preserving range query over cloud data
    Nie, Xueli
    Zhang, Aiqing
    Wang, Yong
    Wang, Weiqi
    Yu, Shui
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [25] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [26] Hermes: A Privacy-Preserving Approximate Search Framework for Big Data
    Zhou, Zhigang
    Zhang, Hongli
    Li, Shang
    Du, Xiaojiang
    IEEE ACCESS, 2018, 6 : 20009 - 20020
  • [27] A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
    Abdel-Rahman, Adam Oumar
    Levillain, Olivier
    Totel, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 185 - 199
  • [28] Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data
    Wodi, Bryan H.
    Leung, Carson K.
    Cuzzocrea, Alfredo
    Ourav, S.
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019,
  • [29] Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds
    Moataz, Tarik
    Justus, Benjamin
    Ray, Indrakshi
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 66 - 81
  • [30] Privacy-preserving outsourced gene data search in encryption domain
    Huang Fengxiao
    Fu Zhangjie
    Sun Xingming
    Yang Ching-Nung
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5178 - 5186