Abstract—Search engine companies collect the “database of intentions”, the histories of their users ’ search queries. These search logs are a gold mine for researchers. Search engine companies, however, are wary of publishing search logs in order not to disclose sensitive information. In this paper we analyze algorithms for publishing frequent keywords, queries and clicks of a search log. We first show how methods that achieve variants of k-anonymity are vulnerable to active attacks. We then demonstrate that the stronger guarantee ensured by -differential privacy unfortunately does not provide any utility for this problem. We then propose a novel algorithm ZEALOUS and show how to set its parameters to achieve (, δ)-probabilistic privacy. We...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Search queries may reveal quite sensitive information about the querier. Even though many queries ar...
Search engine companies collect the “database of intentions,” the histories of their users' search q...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
Query-based web search is becoming an integral part of many people’s daily activities. Most do not r...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
To protect user privacy in the search engine context, most current approaches, such as private infor...
Web query logs data contain information which can be very useful in research or marketing, however, ...
Web search engines gather information from the queries performed by the user in the form of query lo...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
In this age of universal information sharing, there is indeed no time at which information security ...
The publication of Web search logs is very useful for the scientific research community, but to pres...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Search queries may reveal quite sensitive information about the querier. Even though many queries ar...
Search engine companies collect the “database of intentions,” the histories of their users' search q...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
Query-based web search is becoming an integral part of many people’s daily activities. Most do not r...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
To protect user privacy in the search engine context, most current approaches, such as private infor...
Web query logs data contain information which can be very useful in research or marketing, however, ...
Web search engines gather information from the queries performed by the user in the form of query lo...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
In this age of universal information sharing, there is indeed no time at which information security ...
The publication of Web search logs is very useful for the scientific research community, but to pres...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Search queries may reveal quite sensitive information about the querier. Even though many queries ar...