Privacy leakage on the Web: Diffusion and countermeasures

被引:22
|
作者
Malandrino, Delfina [1 ]
Scarano, Vittorio [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, ISISLab, I-84084 Fisciano, SA, Italy
关键词
Online privacy leakage and threats; Privacy enhancing technologies; Web navigation; INTERNET USERS;
D O I
10.1016/j.comnet.2013.06.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user's notice. We present, in this paper, an empirical data study in order to describe how users' privacy can be undermined because of a variety of potential privacy threats on the Web, mainly perpetrated by third party entities against unaware users, and to quantify the penetration of these third party domain servers into their online activities. Moreover, we discuss our methods and findings to protect the individuals against invasions of their privacy and to limit the diffusion of personal and sensitive information during Web browsing. Specifically, we present a supportive, comprehensive and improved approach for privacy protection to allow users to be aware of the risks of their navigation and to give them full control on feasible actions to address the risk of several privacy threats. We envisioned a comprehensive approach to face privacy leakage by adding to the traditional URL-based filtering mechanism a new filtering method which allows to address privacy threats unprecedentedly not dealt with. Our approach is validated by a Firefox extension, named NoTrace, that brings together several existing techniques in this field but also implements new improved techniques that ensure better privacy protection. We used NoTrace to broadly analyze the Web in order to inspect the potential threats contained in the most popular Web sites and inform online users about both their risk and extent. This data set was also used to test the efficiency of NoTrace for effectiveness and performances which allows us to mark a definite improvement on privacy protection for users while navigating the Web. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:2833 / 2855
页数:23
相关论文
共 50 条
  • [21] Study on Countermeasures for Leakage Incident Dealing with Hazardous Chemicals
    Bu Quanmin
    Tong Xing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL TECHNOLOGY AND KNOWLEDGE TRANSFER, 2012, : 743 - 745
  • [22] On Privacy Leakage through Silence Suppression
    Zhu, Ye
    INFORMATION SECURITY, 2011, 6531 : 276 - 282
  • [23] Analysis on the Origin of Flat Roofing Leakage and Design Countermeasures
    Tang Hong
    Wang Jinyu
    CIVIL ENGINEERING IN CHINA - CURRENT PRACTICE AND RESEARCH REPORT, 2010, : 347 - 350
  • [24] PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS
    Al Faresi, Ahmed
    Alazzawe, Ahmed
    Alazzawe, Anis
    COMPUTATIONAL INTELLIGENCE, 2014, 30 (03) : 514 - 534
  • [25] Quantifying Privacy Leakage in Graph Embedding
    Duddu, Vasisht
    Boutet, Antoine
    Shejwalkar, Virat
    PROCEEDINGS OF THE 17TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2020), 2021, : 76 - 85
  • [26] Privacy Leakage Avoidance with Switching Ensembles
    Izmailov, Rauf
    Lin, Peter
    Mesterharm, Chris
    Basu, Samyadeep
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [27] Broadcast Channels With Privacy Leakage Constraints
    Goldfeld, Ziv
    Kramer, Gerhard
    Permuter, Haim H.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (08) : 5138 - 5161
  • [28] Information leakage through document redaction: Attacks and countermeasures
    Lopresti, D
    Spitz, AL
    Document Recognition and Retrieval XII, 2005, 5676 : 183 - 190
  • [29] PDroid: Detecting Privacy Leakage on Android
    Zhang, Pu-han
    Li, Jing-zhe
    Shao, Shuai
    Wang, Peng
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 2658 - 2662
  • [30] Survey: Leakage and Privacy at Inference Time
    Jegorova, Marija
    Kaul, Chaitanya
    Mayor, Charlie
    O'Neil, Alison Q.
    Weir, Alexander
    Murray-Smith, Roderick
    Tsaftaris, Sotirios A.
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (07) : 9090 - 9108