Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/644527.644534acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A new privacy model for hiding group interests while accessing the Web

Published:21 November 2002Publication History

ABSTRACT

This paper presents a new privacy model for hiding the information interests of a homogenous group of users who share a local area network and an access point to the Web. The suggested model is aimed at preventing eavesdroppers from using identifiable members' tracks to infer the group common interests (referred to as the group profile) while allowing members of the group to identify themselves to various services. The model consists of generating faked transactions in various fields of interest in order to confuse eavesdroppers by preventing them from accurate derivation of the group profile. A privacy measure is defined as one that reflects the degree of confusion a system can cause eavesdroppers. A prototype was developed implementing an HTTP proxy that derives the group profile and generates faked transaction in order to hide it. Experiments were conducted in order to examine the effectiveness of the model. Initial results are encouraging.

References

  1. Benassi, P.: TRUSTe: An online privacy seal program. Communication of the ACM, 42,2 (1999) 56--59 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Brier, S.: How to keep your privacy: Battle lines get clearer. The New York Times, January 13, (1997)Google ScholarGoogle Scholar
  3. Claessens, J., Preneel, B., Vandewalle, J.: Solutions for anonymous communication on the Internet. Proceedings of the 1999 IEEE International Carnahan Conference on Security Technology 487 (1999) 298--303Google ScholarGoogle Scholar
  4. Frakes, W. B., Baeza-Yates, R. (ed.): Information Retrieval, Data Structures and Algorithms, Pentice Hall, NJ, USA (1992). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Hiding Routing Information, Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174 (1996) 137--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM 42 (2) (1999) 39--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Grabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. Proceedings of Financial Cryptography (1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hanani, U., Shapira, B., Shoval, P.: Information Filtering: Overview of Issues, Research and Systems, User Modeling and User-Adapted Interaction 11 (2001) 203--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Konstan, A., Bradley, N. M., Malts, D., Herlocker, J. L., Gordon, L. R. and Riedl, J.: GroupLens:., Applying collaborative filtering to usenet news. Communications of the ACM 40(3) (1997) 77--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Morita, M., Shinoda, Y.: Information filtering based on user behavior analysis and best match retrieval. Proceedings of the 17th Annual Intl. ACM SIGIR Conference on Research and Development (1994) 272--281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Oard, D.: The State of the Art in Text Filtering, User Modeling and User Adapted Interaction, 7(3) (1997) 141--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions, ACM Transactions on Information and System Security, 1(1) (1998) 66--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Reiter, M.K., Rubin, A.D.: Anonymous Web Transactions with Crowds, Communications of the ACM 42(2) (1999) 66--92 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Salton, G., Buckley, C.: Term-Weighting Approaches in Automatic Text Retrieval, Information Processing and Management, 24(5) (1998) 513--523. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Salton, G., McGill, W.J.(ed.): Introduction to Modern Information Retrieval. McGraw-Hill. New-York (1983). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shapira, B, Shoval, P., Hanani,U.: Experimentation with an Information Filtering System that Combines Cognitive and Sociological Filtering Integrated with User Stereotypes, Journal: Decision Support Systems 27 (1999) 5--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shapira B., Hanani U., Raveh A., Shoval P.: Information Filtering: A New Two-Phase Model Using Stereotypic User-Profiling. Journal of Intelligent Information Systems 8 (1997) 155--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Syverson, P. F., Goldschlag, D. M., Reed, M. G.: Anonymous Connections and Onion Routing, Proceedings of the 18th Annual Symposium on Security and Privacy, IEEE CS Press, Oakland, CA, (1997) 44--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Blum, M., Von Ahn L. A., Langford, J.: The CAPTCHA Project, "Completely Automatic Public Turing Test to tell Computers and Humans Apart," www.captcha.net, Dept. of Computer Science, Carnegie-Mellon Univ., and personal communications, November 2000.Google ScholarGoogle Scholar
  20. Coates, A. L., Baird, H. S., Fateman, R. J.: Pessimal Print: A Reverse Turing Test, Proceedings of the Sixth International Conference on Document Analysis and Recognition (ICDAR 2001); 2001 September 10--13; Seattle, WA. Los Alamitos, CA: IEEE Computer Society; 2001; 1154--1158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Batista, P., Silva, M. J.: Mining Web Access Logs of an On-Line Newspaper, RPEC2- Workshop on recommendation and personalization on e-commerce, Spain 2002.Google ScholarGoogle Scholar
  22. Loeber, S. G., Aroyo, L. M., Hardmannbsp, L.: An Explicit Model for Tailor-Made eCommerce Web Presentations, Workshop on recommendation and personalization on e-commerce, Spain 2002.Google ScholarGoogle Scholar
  23. Delgado, J.: Multi-Agent Learning in Recommender Systems for Information Filtering on the Internet, International Journal of Cooperative Information Systems Vol. 10, Nos. 1 & 2 (2001) 81--100.Google ScholarGoogle Scholar
  24. Claypool, M., Gokhale, A., Miranda, T., Murnikov, P., Netes, D., Sartin, M.: Combining Content-Based and Collaborative Filters in an Online Newspaper" (1999), ACM SIGIR Workshop on Recommender Systems Berkeley, CA, 1999.Google ScholarGoogle Scholar

Index Terms

  1. A new privacy model for hiding group interests while accessing the Web

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
        November 2002
        115 pages
        ISBN:1581136331
        DOI:10.1145/644527

        Copyright © 2002 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 November 2002

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate106of355submissions,30%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader