Building Privacy-Preserving Search Engine Query Logs for Data Monetization

被引:0
|
作者
Bondia-Barcelo, Julio [1 ]
Castella-Roca, Jordi [1 ]
Viejo, Alexandre [1 ]
机构
[1] Univ Rovira & Virgili, UNESCO, Dept Engn Informat & Matemat, Chair Data Privacy, Av Paisos Catalans 26, E-43007 Tarragona, Spain
关键词
ANONYMIZATION;
D O I
10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web Search Engines (WSEs) keep the record of the queries sent by their users in files named query logs. This kind of data is mainly used to improve the user experience by means of personalizing search results, auto-completing search terms, correcting spelling mistakes, etc. On the other hand, the companies that offer WSE services can also sell this data to obtain economic benefits; this is known as data monetization. Nevertheless, a lot of sensitive data from individuals can be inferred from their past queries (e.g. religion views, sexual preferences, full name, etc.); therefore, the uncontrolled disclosure of query logs may represent a serious privacy risk to the individuals who have participated in their generation. In order to prevent such a dangerous situation, query logs must be anonymized to break the link between any piece of sensitive data and its legitimate owner. This paper proposes a system that allows WSEs to compile privacy-preserving query logs that may be monetized. Well known WSEs such as Google receive, in average, 40000 queries per second, therefore, the proposed scheme has been designed to process queries as fast as possible and in a way that the privacy of the individuals is preserved but the data utility of the anonymized query logs remains maximized.
引用
收藏
页码:390 / 397
页数:8
相关论文
共 50 条
  • [31] Why the search for a privacy-preserving data sharing mechanism is failing
    Stadler, Theresa
    Troncoso, Carmela
    NATURE COMPUTATIONAL SCIENCE, 2022, 2 (04): : 208 - 210
  • [32] Why the search for a privacy-preserving data sharing mechanism is failing
    Theresa Stadler
    Carmela Troncoso
    Nature Computational Science, 2022, 2 : 208 - 210
  • [33] Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query
    Jie Wang
    Xiao Yu
    Ming Zhao
    Arabian Journal for Science and Engineering, 2015, 40 : 2375 - 2388
  • [34] Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query
    Wang, Jie
    Yu, Xiao
    Zhao, Ming
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (08) : 2375 - 2388
  • [35] Privacy-Preserving Outsourced Media Search
    Weng, Li
    Amsaleg, Laurent
    Furon, Teddy
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (10) : 2738 - 2751
  • [36] Working at the web search engine side to generate privacy-preserving user profiles
    Pamies-Estrems, David
    Castella-Roca, Jordi
    Viejo, Alexandre
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 64 : 523 - 535
  • [37] Privacy-preserving Data Retrieval using Anonymous Query Authentication in Data Cloud Services
    Dawoud, Mohanad
    Altilar, D. Turgay
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 2 (CLOSER), 2016, : 171 - 180
  • [38] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [39] Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    Zhang, Yonggang
    Zhu, Hui
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [40] Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
    Ye, Chong-Qiang
    Li, Jian
    Chen, Xiao-Yu
    SENSORS, 2024, 24 (22)