ABSTRACT
This paper presents a new privacy model for hiding the information interests of a homogenous group of users who share a local area network and an access point to the Web. The suggested model is aimed at preventing eavesdroppers from using identifiable members' tracks to infer the group common interests (referred to as the group profile) while allowing members of the group to identify themselves to various services. The model consists of generating faked transactions in various fields of interest in order to confuse eavesdroppers by preventing them from accurate derivation of the group profile. A privacy measure is defined as one that reflects the degree of confusion a system can cause eavesdroppers. A prototype was developed implementing an HTTP proxy that derives the group profile and generates faked transaction in order to hide it. Experiments were conducted in order to examine the effectiveness of the model. Initial results are encouraging.
- Benassi, P.: TRUSTe: An online privacy seal program. Communication of the ACM, 42,2 (1999) 56--59 Google ScholarDigital Library
- Brier, S.: How to keep your privacy: Battle lines get clearer. The New York Times, January 13, (1997)Google Scholar
- Claessens, J., Preneel, B., Vandewalle, J.: Solutions for anonymous communication on the Internet. Proceedings of the 1999 IEEE International Carnahan Conference on Security Technology 487 (1999) 298--303Google Scholar
- Frakes, W. B., Baeza-Yates, R. (ed.): Information Retrieval, Data Structures and Algorithms, Pentice Hall, NJ, USA (1992). Google ScholarDigital Library
- Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Hiding Routing Information, Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174 (1996) 137--150. Google ScholarDigital Library
- Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM 42 (2) (1999) 39--41. Google ScholarDigital Library
- Grabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. Proceedings of Financial Cryptography (1997). Google ScholarDigital Library
- Hanani, U., Shapira, B., Shoval, P.: Information Filtering: Overview of Issues, Research and Systems, User Modeling and User-Adapted Interaction 11 (2001) 203--259. Google ScholarDigital Library
- Konstan, A., Bradley, N. M., Malts, D., Herlocker, J. L., Gordon, L. R. and Riedl, J.: GroupLens:., Applying collaborative filtering to usenet news. Communications of the ACM 40(3) (1997) 77--87. Google ScholarDigital Library
- Morita, M., Shinoda, Y.: Information filtering based on user behavior analysis and best match retrieval. Proceedings of the 17th Annual Intl. ACM SIGIR Conference on Research and Development (1994) 272--281. Google ScholarDigital Library
- Oard, D.: The State of the Art in Text Filtering, User Modeling and User Adapted Interaction, 7(3) (1997) 141--178. Google ScholarDigital Library
- Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions, ACM Transactions on Information and System Security, 1(1) (1998) 66--92. Google ScholarDigital Library
- Reiter, M.K., Rubin, A.D.: Anonymous Web Transactions with Crowds, Communications of the ACM 42(2) (1999) 66--92 Google ScholarDigital Library
- Salton, G., Buckley, C.: Term-Weighting Approaches in Automatic Text Retrieval, Information Processing and Management, 24(5) (1998) 513--523. Google ScholarDigital Library
- Salton, G., McGill, W.J.(ed.): Introduction to Modern Information Retrieval. McGraw-Hill. New-York (1983). Google ScholarDigital Library
- Shapira, B, Shoval, P., Hanani,U.: Experimentation with an Information Filtering System that Combines Cognitive and Sociological Filtering Integrated with User Stereotypes, Journal: Decision Support Systems 27 (1999) 5--24. Google ScholarDigital Library
- Shapira B., Hanani U., Raveh A., Shoval P.: Information Filtering: A New Two-Phase Model Using Stereotypic User-Profiling. Journal of Intelligent Information Systems 8 (1997) 155--165. Google ScholarDigital Library
- Syverson, P. F., Goldschlag, D. M., Reed, M. G.: Anonymous Connections and Onion Routing, Proceedings of the 18th Annual Symposium on Security and Privacy, IEEE CS Press, Oakland, CA, (1997) 44--54. Google ScholarDigital Library
- Blum, M., Von Ahn L. A., Langford, J.: The CAPTCHA Project, "Completely Automatic Public Turing Test to tell Computers and Humans Apart," www.captcha.net, Dept. of Computer Science, Carnegie-Mellon Univ., and personal communications, November 2000.Google Scholar
- Coates, A. L., Baird, H. S., Fateman, R. J.: Pessimal Print: A Reverse Turing Test, Proceedings of the Sixth International Conference on Document Analysis and Recognition (ICDAR 2001); 2001 September 10--13; Seattle, WA. Los Alamitos, CA: IEEE Computer Society; 2001; 1154--1158. Google ScholarDigital Library
- Batista, P., Silva, M. J.: Mining Web Access Logs of an On-Line Newspaper, RPEC2- Workshop on recommendation and personalization on e-commerce, Spain 2002.Google Scholar
- Loeber, S. G., Aroyo, L. M., Hardmannbsp, L.: An Explicit Model for Tailor-Made eCommerce Web Presentations, Workshop on recommendation and personalization on e-commerce, Spain 2002.Google Scholar
- Delgado, J.: Multi-Agent Learning in Recommender Systems for Information Filtering on the Internet, International Journal of Cooperative Information Systems Vol. 10, Nos. 1 & 2 (2001) 81--100.Google Scholar
- Claypool, M., Gokhale, A., Miranda, T., Murnikov, P., Netes, D., Sartin, M.: Combining Content-Based and Collaborative Filters in an Online Newspaper" (1999), ACM SIGIR Workshop on Recommender Systems Berkeley, CA, 1999.Google Scholar
Index Terms
- A new privacy model for hiding group interests while accessing the Web
Recommendations
Minimal privacy disclosure for Accessing Web services
INFOS '16: Proceedings of the 10th International Conference on Informatics and SystemsWeb services are considered as a powerful solution for information systems integration which is based on the service oriented architecture (SOA). Privacy is a big obstacle when using web services. Therefore, accessing web service with minimal privacy ...
Distinguishing Group Privacy From Personal Privacy: The Effect of Group Inference Technologies on Privacy Perceptions and Behaviors
Machine learning and data mining threaten personal privacy, and many tools exist to help users protect their privacy (e.g., available privacy settings on Facebook, anonymization and encryption of personal data, etc.). But such technologies also pose ...
On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on ...
Comments