Search engine companies collect the “database of intentions,” the histories of their users' search queries. These search logs are a gold mine for researchers. Search engine companies, however, are wary of publishing search logs in order not to disclose sensitive information. In this paper, we analyze algorithms for publishing frequent keywords, queries, and clicks of a search log. We first show how methods that achieve variants of k-anonymity are vulnerable to active attacks. We then demonstrate that the stronger guarantee ensured by ε-differential privacy unfortunately does not provide any utility for this problem. We then propose an algorithm ZEALOUS and show how to set its parameters to achieve (ε, δ)-probabilistic privacy. We also contr...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
Search queries may reveal quite sensitive information about the querier. Even though many queries ar...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Abstract—Search engine companies collect the “database of intentions”, the histories of their users ...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
Query-based web search is becoming an integral part of many people’s daily activities. Most do not r...
Web query logs data contain information which can be very useful in research or marketing, however, ...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
To protect user privacy in the search engine context, most current approaches, such as private infor...
Web search engines gather information from the queries performed by the user in the form of query lo...
The publication of Web search logs is very useful for the scientific research community, but to pres...
In this age of universal information sharing, there is indeed no time at which information security ...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
Search queries may reveal quite sensitive information about the querier. Even though many queries ar...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
Abstract—Search engine companies collect the “database of intentions”, the histories of their users ...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
Query-based web search is becoming an integral part of many people’s daily activities. Most do not r...
Web query logs data contain information which can be very useful in research or marketing, however, ...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
To protect user privacy in the search engine context, most current approaches, such as private infor...
Web search engines gather information from the queries performed by the user in the form of query lo...
The publication of Web search logs is very useful for the scientific research community, but to pres...
In this age of universal information sharing, there is indeed no time at which information security ...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
Search queries may reveal quite sensitive information about the querier. Even though many queries ar...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...