A practical privacy-preserving targeted advertising scheme for IPTV users

被引:0
|
作者
Leyli Javid Khayati
Cengiz Orencik
Erkay Savas
Berkant Ustaoglu
机构
[1] Sabanci University,Faculty of Science and Engineering
[2] Izmir Institute of Technology,undefined
来源
International Journal of Information Security | 2016年 / 15卷
关键词
IPTV; Targeted advertising; Privacy; Cryptography; Cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of subscribers, a content provider (IPTV), advertisers and a semi-trusted server. To target potential customers, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are periodically (e.g., weekly) published on a semi-trusted server (e.g., cloud server) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the server, are considered (trade) secrets and therefore are protected as well. The server is oblivious to the published data and the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with so-called trapdoors by the IPTV, can query the cloud server and access the query results. Even when some background information about users is available, query responses do not leak sensitive information about the IPTV users. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is practical. The algorithms demonstrate both weak and strong scaling property and take advantage of high level of parallelism. The scheme can also be applied as a recommendation system.
引用
收藏
页码:335 / 360
页数:25
相关论文
共 50 条
  • [1] A practical privacy-preserving targeted advertising scheme for IPTV users
    Khayati, Leyli Javid
    Orencik, Cengiz
    Savas, Erkay
    Ustaoglu, Berkant
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (04) : 335 - 360
  • [2] Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis
    Liu, Yang
    Simpson, Andrew
    DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 94 - 110
  • [3] Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted Advertising
    Mosher, Brennan
    Li, Xiangman
    He, Yuanyuan
    Ni, Jianbing
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 308 - 316
  • [4] Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation
    Liu, Yang
    Simpson, Andrew
    SOFTWARE-PRACTICE & EXPERIENCE, 2016, 46 (12): : 1657 - 1684
  • [5] PROTA: A Privacy-Preserving Protocol for Real-Time Targeted Advertising
    Pang, Yiming
    Wang, Bo
    Wu, Fan
    Chen, Guihai
    Sheng, Bo
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [6] Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids
    Chang, Yuan
    Li, Jiliang
    Lu, Ning
    Shi, Wenbo
    Su, Zhou
    Meng, Weizhi
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02): : 1990 - 2005
  • [7] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [8] A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability
    Lei, Jing
    Pei, Qingqi
    Liu, Xuefeng
    Sun, Wenhai
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 193 - 203
  • [9] Practical privacy-preserving benchmarking
    Kerschbaum, Florian
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 17 - 31
  • [10] Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability
    Yang, Xiaodong
    Wang, Meiding
    Li, Ting
    Liu, Rui
    Wang, Caifen
    IEEE ACCESS, 2020, 8 : 130866 - 130877