Privacy leakage on the Web: Diffusion and countermeasures

被引:22
|
作者
Malandrino, Delfina [1 ]
Scarano, Vittorio [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, ISISLab, I-84084 Fisciano, SA, Italy
关键词
Online privacy leakage and threats; Privacy enhancing technologies; Web navigation; INTERNET USERS;
D O I
10.1016/j.comnet.2013.06.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user's notice. We present, in this paper, an empirical data study in order to describe how users' privacy can be undermined because of a variety of potential privacy threats on the Web, mainly perpetrated by third party entities against unaware users, and to quantify the penetration of these third party domain servers into their online activities. Moreover, we discuss our methods and findings to protect the individuals against invasions of their privacy and to limit the diffusion of personal and sensitive information during Web browsing. Specifically, we present a supportive, comprehensive and improved approach for privacy protection to allow users to be aware of the risks of their navigation and to give them full control on feasible actions to address the risk of several privacy threats. We envisioned a comprehensive approach to face privacy leakage by adding to the traditional URL-based filtering mechanism a new filtering method which allows to address privacy threats unprecedentedly not dealt with. Our approach is validated by a Firefox extension, named NoTrace, that brings together several existing techniques in this field but also implements new improved techniques that ensure better privacy protection. We used NoTrace to broadly analyze the Web in order to inspect the potential threats contained in the most popular Web sites and inform online users about both their risk and extent. This data set was also used to test the efficiency of NoTrace for effectiveness and performances which allows us to mark a definite improvement on privacy protection for users while navigating the Web. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:2833 / 2855
页数:23
相关论文
共 50 条
  • [11] DATA LEAKAGE IN ICT OUTSOURCING: RISKS AND COUNTERMEASURES
    Lin, Yap May
    Zakariah, Mas Idayu
    Mohamed, Azlinah
    JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA, 2010, 9 : 87 - 109
  • [12] Privacy in Neural Network Learning: Threats and Countermeasures
    Chang, Shan
    Li, Chao
    IEEE NETWORK, 2018, 32 (04): : 61 - 67
  • [13] Privacy Leakage in Privacy-Preserving Neural Network Inference
    Wei, Mengqi
    Zhu, Wenxing
    Cui, Liangkun
    Li, Xiangxue
    Li, Qiang
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 133 - 152
  • [14] Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions
    Zhao, Yufei
    Yang, Liqun
    Li, Zhoujun
    He, Longtao
    Zhang, Yipeng
    IEEE ACCESS, 2021, 9 : 44502 - 44513
  • [15] AI and privacy on the Web
    不详
    IEEE INTELLIGENT SYSTEMS, 2006, 21 (04) : 4 - 6
  • [16] A Survey on Web Application Vulnerabilities and Countermeasures
    Atashzar, Hasty
    Torkaman, Atefeh
    Bahrololum, Marjan
    Tadayon, Mohammad H.
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 647 - 652
  • [17] The illusion of web privacy
    Cherry, SM
    IEEE SPECTRUM, 2004, 41 (04) : 56 - +
  • [18] Security and Privacy on the Web
    Grandison, Tyrone
    Koved, Larry
    IEEE SOFTWARE, 2015, 32 (04) : 36 - 39
  • [19] THE REALITY OF PRIVACY ON THE WEB
    Springer, Robert
    ECONTENT, 2015, 38 (08) : 10 - 15
  • [20] Web login Vulnerability Analysis and Countermeasures
    Yoo, Seung-Jae
    Yang, Jeong-Mo
    2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,