Abstract

Web search querying is an inevitable activity of any Internet user. The web search engine (WSE) is the easiest way to search and retrieve data from the Internet. The WSE stores the user’s search queries to retrieve the personalized search result in a form of query log. A user often leaves digital traces and sensitive information in the query log. WSE is known to sell the query log to a third party to generate revenue. However, the release of the query log can compromise the security and privacy of a user. In this work, we propose a Profile Aware ObScure Logging (PaOSLo) Web search privacy-preserving protocol that mitigates the digital traces a user leaves in Web searching. PaOSLo systematically groups users based on profile similarity. The primary objective of this work is to evaluate the impact of the systematic group compared to random grouping. We first computed the similarity between the users’ profiles and then clustered them using the K-mean algorithm to group the users systematically. Unlikability and indistinguishability are the two dimensions in which we have measured the privacy of a user. To compute the impact of systematic grouping on a user’s privacy, we have experimented with and compared the performance of PaOSLo with modern distributed protocols like OSLo and UUP(e). Results show that, at the top degree of the ODP hierarchy, PaOSLo preserved 10% and 3% better profile privacy than the modern distributed protocols mentioned above. In addition, the PaOSLo has less profile exposure for any group size and at each degree of the ODP hierarchy.

Highlights

  • Web search engines (WSEs) like Google, Ask, Bing, America Online (AOL), Baidu, and others provide the easiest way to search and retrieve information from the Web. e web search engine (WSE) stores the users’ submitted queries in a query log. e WSE regularly builds and updates a user profile from the query log to provide personalized results [1]. e WSE generates revenue by analyzing the query log coupled with a user profile to provide relevant advertisements [2, 3]

  • Afterwards, the Ui generates a q_ID, which the Ui will use for result identification. e Ui generates the encrypted message by concatenating the encrypted message and q_ID. e query encryption ensures the confidentiality of the query contents

  • Each user’s query log is obtained and developed their profile from it. e profile privacy a user succeeds by executing Profile Aware ObScure Logging (PaOSLo) has been compared with modern distributed privacypreserving protocols such as ObScure logging (OSLo) [11] and Useless User Profile (UUP)(e) [16]

Read more

Summary

Introduction

Web search engines (WSEs) like Google, Ask, Bing, AOL, Baidu, and others provide the easiest way to search and retrieve information from the Web. e WSE stores the users’ submitted queries in a query log. e WSE regularly builds and updates a user profile from the query log to provide personalized results [1]. e WSE generates revenue by analyzing the query log coupled with a user profile to provide relevant advertisements [2, 3]. E WSE regularly builds and updates a user profile from the query log to provide personalized results [1]. In today’s Internet life, preserving web search privacy is the real perturb of a user. Existing techniques hide the identity through unlinkability and obfuscate the profile through indistinguishability to succeed the Web search privacy of a person [2, 6]. Internet users often use proxy services (like scoogle.com, anonymizer.com, and others) and TOR (the onion routing) network to attain unlinkability [7], whereas users utilise TrackMeNot [7], GooPIR, and DisPA [8] to achieve indistinguishability by sending fictitious but real queries to obfuscate the profile maintained by the WSE [2]. The WSE can recognise TOR users’ queries from the cookies

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.