Abstract—We address the problem of query profile obfuscation by means of partial query exchanges between two users, in order for their profiles of interest to appear distorted to the information provider (database, search engine, etc.). We illustrate a methodology to reach mutual privacy gain, that is, a situation where both users increase their own privacy protection through collaboration in query exchange. To this end, our approach starts with a mathematical formulation, involving the modeling of the users’ apparent profiles as probability distributions over categories of interest, and the measure of their privacy as the corresponding Shannon entropy. The question of which query categories to exchange translates into finding optimization ...
The queries we perform, the searches we make, and the websites we visit — this sensitive data...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
We present a mathematical formulation for the optimization of query forgery for private information ...
In this paper, we consider a scenario where a user queries a user profile database, maintained by a ...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Driven by the economics of surveillance capitalism, online service providers profile users to infer ...
Abstract. The notion of differential privacy has emerged in the area of statisti-cal databases to pr...
Traces related to our identity are left every day while we browse the Internet. Being the user’s inf...
Abstract. In previous work, we presented a novel information-theoretic privacy criterion for query f...
In this paper, we consider a scenario where a user queries a user profile database, maintained by a ...
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal informat...
With the emergence of the Big Data era, privacy has become an increasingly important issue. The cons...
In recent times we are witnessing the emergence of a wide variety of information systems that tailor...
Due to the wide deployment of Internet and information technology, the ever growing privacy concern ...
The queries we perform, the searches we make, and the websites we visit — this sensitive data...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
We present a mathematical formulation for the optimization of query forgery for private information ...
In this paper, we consider a scenario where a user queries a user profile database, maintained by a ...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Driven by the economics of surveillance capitalism, online service providers profile users to infer ...
Abstract. The notion of differential privacy has emerged in the area of statisti-cal databases to pr...
Traces related to our identity are left every day while we browse the Internet. Being the user’s inf...
Abstract. In previous work, we presented a novel information-theoretic privacy criterion for query f...
In this paper, we consider a scenario where a user queries a user profile database, maintained by a ...
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal informat...
With the emergence of the Big Data era, privacy has become an increasingly important issue. The cons...
In recent times we are witnessing the emergence of a wide variety of information systems that tailor...
Due to the wide deployment of Internet and information technology, the ever growing privacy concern ...
The queries we perform, the searches we make, and the websites we visit — this sensitive data...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...