A survey of query log privacy-enhancing techniques from a policy perspective

  • Authors:
  • Alissa Cooper

  • Affiliations:
  • Center for Democracy & Technology, District of Columbia

  • Venue:
  • ACM Transactions on the Web (TWEB)
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

As popular search engines face the sometimes conflicting interests of protecting privacy while retaining query logs for a variety of uses, numerous technical measures have been suggested to both enhance privacy and preserve at least a portion of the utility of query logs. This article seeks to assess seven of these techniques against three sets of criteria: (1) how well the technique protects privacy, (2) how well the technique preserves the utility of the query logs, and (3) how well the technique might be implemented as a user control. A user control is defined as a mechanism that allows individual Internet users to choose to have the technique applied to their own query logs.