Privacy leakage on the Web: Diffusion and countermeasures

被引:22
|
作者
Malandrino, Delfina [1 ]
Scarano, Vittorio [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, ISISLab, I-84084 Fisciano, SA, Italy
关键词
Online privacy leakage and threats; Privacy enhancing technologies; Web navigation; INTERNET USERS;
D O I
10.1016/j.comnet.2013.06.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user's notice. We present, in this paper, an empirical data study in order to describe how users' privacy can be undermined because of a variety of potential privacy threats on the Web, mainly perpetrated by third party entities against unaware users, and to quantify the penetration of these third party domain servers into their online activities. Moreover, we discuss our methods and findings to protect the individuals against invasions of their privacy and to limit the diffusion of personal and sensitive information during Web browsing. Specifically, we present a supportive, comprehensive and improved approach for privacy protection to allow users to be aware of the risks of their navigation and to give them full control on feasible actions to address the risk of several privacy threats. We envisioned a comprehensive approach to face privacy leakage by adding to the traditional URL-based filtering mechanism a new filtering method which allows to address privacy threats unprecedentedly not dealt with. Our approach is validated by a Firefox extension, named NoTrace, that brings together several existing techniques in this field but also implements new improved techniques that ensure better privacy protection. We used NoTrace to broadly analyze the Web in order to inspect the potential threats contained in the most popular Web sites and inform online users about both their risk and extent. This data set was also used to test the efficiency of NoTrace for effectiveness and performances which allows us to mark a definite improvement on privacy protection for users while navigating the Web. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:2833 / 2855
页数:23
相关论文
共 50 条
  • [31] Privacy Leakage in Biometric Secrecy Systems
    Ignatenko, Tanya
    Willems, Frans M. J.
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 850 - 857
  • [32] ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures
    Saha, Sayandeep
    Kumar, S. Nishok
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    Dasgupta, Pallab
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [33] Relationship Privacy Leakage in Network Traffics
    Hu, Jie
    Lin, Chuang
    Li, Xiangyang
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [34] Machine learning security and privacy: a review of threats and countermeasures
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [35] Privacy in Content-Oriented Networking: Threats and Countermeasures
    Chaabane, Abdelberi
    De Cristofaro, Emiliano
    Kaafar, Mohamed Ali
    Uzun, Ersin
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (03) : 26 - 33
  • [36] The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures
    Zhou, Lin
    Wan, Changsheng
    Huang, Jie
    Pei, Bei
    Chen, Changsong
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 64 - 71
  • [37] Privacy Concerns from Single-Word Search Query Leakage from Web Browsers Through DNS
    Isobe, Katsuki
    Kondo, Daishi
    Tode, Hideki
    IEEE Networking Letters, 2022, 4 (01): : 48 - 52
  • [38] IoV security and privacy survey: issues, countermeasures, and challenges
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (15): : 23018 - 23082
  • [39] Security and Privacy Problems and Countermeasures of Internet of Things Applications
    Liu, Junlan
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 223 - 226
  • [40] Privacy and security vulnerabilities in edge intelligence: An analysis and countermeasures
    Shafee, Ahmed
    Hasan, S. R.
    Awaad, Tasneem A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123