Privacy leakage on the Web: Diffusion and countermeasures

被引:22
|
作者
Malandrino, Delfina [1 ]
Scarano, Vittorio [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, ISISLab, I-84084 Fisciano, SA, Italy
关键词
Online privacy leakage and threats; Privacy enhancing technologies; Web navigation; INTERNET USERS;
D O I
10.1016/j.comnet.2013.06.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user's notice. We present, in this paper, an empirical data study in order to describe how users' privacy can be undermined because of a variety of potential privacy threats on the Web, mainly perpetrated by third party entities against unaware users, and to quantify the penetration of these third party domain servers into their online activities. Moreover, we discuss our methods and findings to protect the individuals against invasions of their privacy and to limit the diffusion of personal and sensitive information during Web browsing. Specifically, we present a supportive, comprehensive and improved approach for privacy protection to allow users to be aware of the risks of their navigation and to give them full control on feasible actions to address the risk of several privacy threats. We envisioned a comprehensive approach to face privacy leakage by adding to the traditional URL-based filtering mechanism a new filtering method which allows to address privacy threats unprecedentedly not dealt with. Our approach is validated by a Firefox extension, named NoTrace, that brings together several existing techniques in this field but also implements new improved techniques that ensure better privacy protection. We used NoTrace to broadly analyze the Web in order to inspect the potential threats contained in the most popular Web sites and inform online users about both their risk and extent. This data set was also used to test the efficiency of NoTrace for effectiveness and performances which allows us to mark a definite improvement on privacy protection for users while navigating the Web. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:2833 / 2855
页数:23
相关论文
共 50 条
  • [2] Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage
    Karami, Soroush
    Ilia, Panagiotis
    Polakis, Jason
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [3] semantic web attacks and countermeasures
    Kumar, Sumit
    Kumar, Suresh
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [4] On the Privacy Leakage of Coded Caching
    Wang, Yu
    Abouzeid, Alhussein A.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [5] The Impact of Linkability On Privacy Leakage
    Hassanpour, Ahmad
    Utsash, Masrur Masqub
    Yang, Bian
    PROCEEDINGS OF THE 2023 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2023, 2023, : 364 - 370
  • [6] Privacy Leakage in Wireless Charging
    Liu, Jianwei
    Zou, Xiang
    Zhao, Leqi
    Tao, Yusheng
    Hu, Sideng
    Han, Jinsong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 501 - 514
  • [7] A Composite Privacy Leakage Indicator
    Nils Ulltveit-Moe
    Vladimir A. Oleshchuk
    Wireless Personal Communications, 2011, 61 : 511 - 526
  • [8] On the damage and compensation of privacy leakage
    Wang, DW
    Liau, CJ
    Hsu, TS
    Chen, JKP
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 311 - 324
  • [9] A Composite Privacy Leakage Indicator
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir A.
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) : 511 - 526
  • [10] Leakage analysis of DPA countermeasures at the logic level
    Saeki, Minoru
    Suzuki, Daisuke
    Ichikawa, Tetsuya
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 169 - 178