4.7 Article

Using social networks to distort users' profiles generated by web search engines

Journal

COMPUTER NETWORKS
Volume 54, Issue 9, Pages 1343-1357

Publisher

ELSEVIER
DOI: 10.1016/j.comnet.2009.11.003

Keywords

Privacy; Private information retrieval; Social networks; Web search

Funding

  1. Spanish Ministry of Education [TSI2007-65406-C03-01, CSD2007-00004]
  2. Spanish Ministry of Industry, Commerce and Tourism [TSI-020100-2009-720]
  3. Government of Catalonia [2009 SGR 1135]

Ask authors/readers for more resources

The Internet is one of the most important sources of knowledge in the present time. It offers a huge volume of information which grows dramatically every day. Web search engines (e.g. Google, Yahoo ...) are widely used to find specific data among that information. However, these useful tools also represent a privacy threat for the users: the web search engines profile them by storing and analyzing all the searches that they have previously submitted. To address this privacy threat, current solutions propose new mechanisms that introduce a high cost in terms of computation and communication. In this paper, we propose a new scheme designed to protect the privacy of the users from a web search engine that tries to profile them. Our system uses social networks to provide a distorted user profile to the web search engine. The proposed protocol submits standard queries to the web search engine: thus it does not require any change in the server side. In addition to that, this scheme does not require the server to collaborate with the users. Our protocol improves the existing solutions in terms of query delay. Besides, the distorted profiles still allow the users to get a proper service from the web search engines. (C) 2009 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services

Alexandre Viejo, David Sanchez

AD HOC NETWORKS (2019)

Article Computer Science, Hardware & Architecture

Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services

M. Magdalena Payeras-Capella, Macia Mut-Puigserver, Pau Conejero-Alberola, Jordi Castella-Roca, Llorenc Huguet-Rotger

COMPUTER JOURNAL (2020)

Article Computer Science, Theory & Methods

Secure monitoring in IoT-based services via fog orchestration

Alexandre Viejo, David Sanchez

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Chemistry, Multidisciplinary

Automatic Assessment of Privacy Policies under the GDPR

David Sanchez, Alexandre Viejo, Montserrat Batet

Summary: This paper introduces a system that can automatically assess the compliance of privacy policies and provide clear and intuitive privacy scores to users. By using this system, users can understand the risks and severity associated with services, enabling them to make informed decisions. The proposed method has been applied to the policies of 10 well-known internet services, with results consistent with related works.

APPLIED SCIENCES-BASEL (2021)

Article Computer Science, Artificial Intelligence

Privacy protection of user profiles in online search via semantic randomization

Mercedes Rodriguez-Garcia, Montserrat Batet, David Sanchez, Alexandre Viejo

Summary: This paper proposes a semantically grounded method to generate fake queries for better privacy protection, satisfying user requirements while reducing the number of fake queries necessary. The approach offers more control and greater efficiency in protecting user profiles in front of search engines.

KNOWLEDGE AND INFORMATION SYSTEMS (2021)

Article Engineering, Civil

Security and Privacy in a Blockchain-Powered Access Control System for Low Emission Zones

Caries Angles-Tafalla, Alexandre Viejo, Jordi Castella-Roca, Macia Mut-Puigserver, M. Magdalena Payeras-Capellae

Summary: This paper proposes a new scheme for managing low emission zones by decentralizing the management of vehicle access and charging, protecting user privacy, and improving system security and availability.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Proceedings Paper Computer Science, Information Systems

Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data Management

Cristofol Dauden-Esmel, Jordi Castella-Roca, Alexandre Viejo, Josep Domingo-Ferrer

Summary: In this paper, a lightweight blockchain-based GDPR-compliant personal data management platform is proposed. It provides public access to immutable evidences that demonstrate the agreements between Data Subjects and Service Providers. This platform allows Service Providers to show compliance with regulations, while also enabling Data Subjects to be informed about the handling of their personal data and manage it according to their rights.

2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP) (2021)

Article Computer Science, Information Systems

A Real-Time Query Log Protection Method for Web Search Engines

David Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia-Alfaro

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Theory & Methods

Decentralized Privacy-preserving Access for Low Emission Zones

Carles Angles-Tafalla, Sara Ricci, Petr Dzurenda, Jan Hajny, Jordi Castella-Roca, Alexandre Viejo

PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT (2019)

Proceedings Paper Computer Science, Theory & Methods

Lifelogging Protection Scheme for Internet-Based Personal Assistants

David Pamies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro

DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY (2018)

Proceedings Paper Transportation Science & Technology

Key management system for private car-sharing scenarios

Ana C. Hernandez, Jordi Castella Roca, Alexandre Viejo

2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL) (2018)

Article Computer Science, Hardware & Architecture

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification

Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo

Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

QoS-based resource allocation for uplink NOMA networks

Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie

Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks

Songshi Dou, Li Qi, Zehua Guo

Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

An efficient topology partitioning algorithm for system-level parallel simulation of mega satellite constellation communication networks

Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou

Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Reuse-based online joint routing and scheduling optimization mechanism in deterministic networks

Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li

Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.

COMPUTER NETWORKS (2024)