Abstract
From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personalized profiling? In particular, we ask how we can improve detection of sensitive topic profiling by online systems. We propose a definition of privacy disclosure that we call ε-indistinguishability, from which we construct scalable, practical tools to assess the learning potential from personalized content. We demonstrate our results using openly available resources, detecting a learning rate in excess of 98% for a range of sensitive topics during our experiments.
- Lalit Agarwal, Nisheeth Shrivastava, Sharad Jaiswal, and Saurabh Panjwani. 2013. Do not embarrass: Re-examining user concerns for online tracking and advertising. In Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS’13). ACM, New York, Article 8, 13 pages. DOI:http://dx.doi.org/ 10.1145/2501604.2501612 Google Scholar
Digital Library
- Gaurav Aggarwal, Elie Bursztein, Collin Jackson, and Dan Boneh. 2010. An analysis of private browsing modes in modern browsers. In Proceedings of the 19th USENIX Conference on Security (USENIX Security’10). USENIX Association, Berkeley, CA, 6--6. http://dl.acm.org/citation.cfm?id=1929820.1929828 Google Scholar
Digital Library
- Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. 2012. ObliviAd: Provably secure and practical online behavioral advertising. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP’12). IEEE Computer Society, Washington, DC, 257--271. DOI:http://dx.doi.org/10.1109/SP.2012.25 Google Scholar
Digital Library
- Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python (1st ed.). O’Reilly Media, Inc. Google Scholar
Digital Library
- Danah Boyd. June 6, 2011. Networked Privacy. (June 6, 2011).Google Scholar
- U.S. Equal Employment Opportunity Commission. 2015. Types of Discrimination. (2015). (Retrieved on March 21, 2015, from http://www.eeoc.gov/laws/types/).Google Scholar
- Anupam Datta. 2014. Privacy through accountability: A computer science perspective. In Proceedings of the 10th International Conference on Distributed Computing and Internet Technology - Volume 8337 (ICDCIT 2014). Springer-Verlag New York, Inc., New York, 43--49. DOI:http://dx.doi.org/10.1007/ 978-3-319-04483-5_5 Google Scholar
Digital Library
- Zekeriya Erkin, Michael Beye, Thijs Veugen, and Reginald L. Lagendijk. 2010. Privacy enhanced recommender system. In Proceedings of the 31st Symposium on Information Theory in the Benelux, WIC 2010. IEEE Benelux Information Theory Chapter, 35--42. http://doc.utwente.nl/87258/.Google Scholar
- Zekeriya Erkin, Michael Beye, Thijs Veugen, and Reginald L. Lagendijk. 2011. Efficiently computing private recommendations. In Proceedings of the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 5864--5867.Google Scholar
- Electronic Frontier Foundation. 2015a. https://www.eff.org/privacybadger. (Retrieved Sept. 25, 2015).Google Scholar
- Electronic Frontier Foundation. 2015b. https://www.google.com/intl/en/policies/privacy/?fg=1. (Retrieved Sept. 25, 2015).Google Scholar
- Google. 2015. Google Trends. http://www.google.com/trends/. (Retrieved March 21, 2015).Google Scholar
- Google Knowledge Graph. 2015. http://googleblog.blogspot.co.uk/2012/05/introducing-knowledge-graph- things-not.html. (Retrieved Sept. 30, 2015).Google Scholar
- Saikat Guha, Bin Cheng, and Paul Francis. 2010. Challenges in measuring online advertising systems. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC’10). ACM, New York, 81--87. DOI:http://dx.doi.org/10.1145/1879141.1879152 Google Scholar
Digital Library
- Saikat Guha, Bin Cheng, and Paul Francis. 2011. Privad: Practical privacy in online advertising. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI’11). USENIX Association, Berkeley, CA, 169--182. http://dl.acm.org/citation.cfm?id=1972457.1972475 Google Scholar
Digital Library
- Aniko Hannak, Piotr Sapiezynski, Arash Molavi Kakhki, Balachander Krishnamurthy, David Lazer, Alan Mislove, and Christo Wilson. 2013. Measuring personalization of web search. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 527--538. http://dl.acm.org/citation.cfm?id=2488388.2488435 Google Scholar
Digital Library
- Daniel C. Howe, Helen Nissenbaum, and Vincent Toubiana. 2009. TrackMeNot. mrl. nyu. edu/dhower/trackmenot (2009).Google Scholar
- Ivan Idris. 2012. NumPy Cookbook. Packt Publishing. Google Scholar
Digital Library
- iSense. 2015. http://www.isense.net. (Retrieved Sept. 30, 2015).Google Scholar
- Bernard J. Jansen, Zhe Liu, and Zach Simon. 2013. The effect of ad rank on the performance of keyword advertising campaigns. Journal of the American Society for Information Science and Technology 64, 10 (2013), 2115--2132.Google Scholar
Cross Ref
- Amy N. Langville and Carl D. Meyer. 2006. Google’s PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, Princeton, NJ. Google Scholar
Digital Library
- Mathias Lécuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, and Roxana Geambasu. 2014. XRay: Enhancing the web’s transparency with differential correlation. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC’14). USENIX Association, Berkeley, CA, 49--64. http://dl.acm.org/citation.cfm?id=2671225.2671229. Google Scholar
Digital Library
- Ronny Lempel and Shlomo Moran. 2005. Rank-stability and rank-similarity of link-based web ranking algorithms in authority-connected graphs. Information Retrieval 8, 2 (2005), 245--264. Google Scholar
Digital Library
- Mozilla Foundation. 2015c. https://www.mozilla.org/en-US/lightbeam/. (Retrieve Sept. 25, 2015).Google Scholar
- Paul Ohm. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57 (2010), 1701.Google Scholar
- Saurabh Panjwani, Nisheeth Shrivastava, Saurabh Shukla, and Sharad Jaiswal. 2013. Understanding the privacy-personalization dilemma for web search: A user perspective. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’13). ACM, New York, 3427--3430. DOI:http://dx.doi.org/10.1145/2470654.2466470 Google Scholar
Digital Library
- Eli Pariser. 2011. The Filter Bubble: What the Internet Is Hiding from You. Penguin Group. Google Scholar
Digital Library
- Sai Teja Peddinti and Nitesh Saxena. 2011. On the limitations of query obfuscation techniques for location privacy. In Proceedings of the 13th International Conference on Ubiquitous Computing. ACM, 187--196. Google Scholar
Digital Library
- F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine learning in python. Journal of Machine Learning Research 12 (2011), 2825--2830. Google Scholar
Digital Library
- Naren Ramakrishnan, Benjamin J. Keller, Batul J. Mirza, Ananth Y. Grama, and George Karypis. 2001. Privacy risks in recommender systems. IEEE Internet Computing 5, 6 (2001), 54--62. Google Scholar
Digital Library
- Francesco Ricci, Lior Rokach, Bracha Shapira, and Paul B. Kantor. 2010. Recommender Systems Handbook (1st ed.). Springer-Verlag New York, Inc., New York. Google Scholar
Digital Library
- Matthew Richardson, Ewa Dominowska, and Robert Ragno. 2007. Predicting clicks: Estimating the click-through rate for new ads. In Proceedings of the 16th International Conference on World Wide Web. ACM, 521--530. Google Scholar
Digital Library
- Paul M. Schwartz and Daniel J. Solove. 2011. PII problem: Privacy and a new concept of personally identifiable information, the. NYUL Review 86 (2011), 1814.Google Scholar
- Myra Spiliopoulou, Bamshad Mobasher, Olfa Nasraoui, and Osmar Zaiane. 2012. Guest editorial: Special issue on a decade of mining the web. Data Mining and Knowledge Discovery 24, 3 (2012), 473--477. DOI:http://dx.doi.org/10.1007/s10618-012-0257-y Google Scholar
Digital Library
- Latanya Sweeney. 2013. Discrimination in online ad delivery. Queue 11, 3, Article 10 (March 2013). DOI:http://dx.doi.org/10.1145/2460276.2460278 Google Scholar
Digital Library
- Zemanta. 2015. http://www.zemanta.com. (Retrieved Sept. 30, 2015).Google Scholar
Index Terms
Don’t Let Google Know I’m Lonely
Recommendations
Research on Security for Personal Information and Privacy Under Network Environment
CINC '09: Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing - Volume 02With the development of the Internet, the security of personal information privacy has been widespread concern, from "Yan Zhao Men Incident” to "Human search", personal information and privacy has become an urgent need for China to resolve. The paper ...
Assuring privacy when big brother is watching
DMKD '03: Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discoveryHomeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and potential abuses of the data. Privacy-preserving data mining techniques ...
I know where you live: analyzing privacy protection in public databases
WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic societyPolicymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property ...






Comments