Building Privacy-Preserving Search Engine Query Logs for Data Monetization

被引:0
|
作者
Bondia-Barcelo, Julio [1 ]
Castella-Roca, Jordi [1 ]
Viejo, Alexandre [1 ]
机构
[1] Univ Rovira & Virgili, UNESCO, Dept Engn Informat & Matemat, Chair Data Privacy, Av Paisos Catalans 26, E-43007 Tarragona, Spain
关键词
ANONYMIZATION;
D O I
10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web Search Engines (WSEs) keep the record of the queries sent by their users in files named query logs. This kind of data is mainly used to improve the user experience by means of personalizing search results, auto-completing search terms, correcting spelling mistakes, etc. On the other hand, the companies that offer WSE services can also sell this data to obtain economic benefits; this is known as data monetization. Nevertheless, a lot of sensitive data from individuals can be inferred from their past queries (e.g. religion views, sexual preferences, full name, etc.); therefore, the uncontrolled disclosure of query logs may represent a serious privacy risk to the individuals who have participated in their generation. In order to prevent such a dangerous situation, query logs must be anonymized to break the link between any piece of sensitive data and its legitimate owner. This paper proposes a system that allows WSEs to compile privacy-preserving query logs that may be monetized. Well known WSEs such as Google receive, in average, 40000 queries per second, therefore, the proposed scheme has been designed to process queries as fast as possible and in a way that the privacy of the individuals is preserved but the data utility of the anonymized query logs remains maximized.
引用
收藏
页码:390 / 397
页数:8
相关论文
共 50 条
  • [41] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177
  • [42] Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
    Samanthula, Bharath Kumar
    Jiang, Wei
    Bertino, Elisa
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 400 - 418
  • [43] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [44] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [45] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [46] Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data
    Yang, Yutao
    Miao, Yinbin
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 392 - 402
  • [47] Privacy-Preserving Data Publishing
    Liu, Ruilin
    Wang, Hui
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 305 - 308
  • [48] Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data
    Li, Xiaoguo
    Xiang, Tao
    Guo, Shangwei
    Li, Hongwei
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2954 - 2968
  • [49] An Efficient and Privacy-Preserving k-NN Query Scheme for eHealthcare Data
    Zheng, Yandong
    Lu, Rongxing
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 358 - 365
  • [50] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402