Accurately interpreting clickthrough data as implicit feedback
Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval
On anonymizing query logs via token-based hashing
Proceedings of the 16th international conference on World Wide Web
Random walks on the click graph
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Extracting semantic relations from query logs
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
"I know what you did last summer": query logs and user privacy
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management
Mechanism Design via Differential Privacy
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
Using the wisdom of the crowds for keyword generation
Proceedings of the 17th international conference on World Wide Web
A learning theory approach to non-interactive database privacy
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Vanity fair: privacy in querylog bundles
Proceedings of the 17th ACM conference on Information and knowledge management
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
When random sampling preserves privacy
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Our data, ourselves: privacy via distributed noise generation
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Effective anonymization of query logs
Proceedings of the 18th ACM conference on Information and knowledge management
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Anonymizing user profiles for personalized web search
Proceedings of the 19th international conference on World wide web
Discovering frequent patterns in sensitive data
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Private and continual release of statistics
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
LogCLEF 2009: the CLEF 2009 multilingual logfile analysis track overview
CLEF'09 Proceedings of the 10th cross-language evaluation forum conference on Multilingual information access evaluation: text retrieval experiments
Semantic microaggregation for the anonymization of query logs
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Differentially private data release through multidimensional partitioning
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Shopping for products you don't know you need
Proceedings of the fourth ACM international conference on Web search and data mining
Foundations and Trends in Information Retrieval
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
iReduct: differential privacy with reduced relative errors
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Multilingual log analysis: LogCLEF
ECIR'11 Proceedings of the 33rd European conference on Advances in information retrieval
CrowdLogging: distributed, private, and anonymous search logging
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
Transactions on Data Privacy
I have a DREAM!: differentially private smart metering
IH'11 Proceedings of the 13th international conference on Information hiding
Private and Continual Release of Statistics
ACM Transactions on Information and System Security (TISSEC)
User k-anonymity for privacy preserving data mining of query logs
Information Processing and Management: an International Journal
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
Data Mining and Knowledge Discovery
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Differentially private search log sanitization with optimal output utility
Proceedings of the 15th International Conference on Extending Database Technology
The application of differential privacy to health data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy preservation by disassociation
Proceedings of the VLDB Endowment
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Functional mechanism: regression analysis under differential privacy
Proceedings of the VLDB Endowment
Proceedings of the 2012 ACM conference on Computer and communications security
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
Privacy auctions for recommender systems
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Differential privacy data release through adding noise on average value
NSS'12 Proceedings of the 6th international conference on Network and System Security
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
Semantic search log k-anonymization with generalized k-cores of query concept graph
ECIR'13 Proceedings of the 35th European conference on Advances in Information Retrieval
Privacy-preserving data exploration in genome-wide association studies
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
Monitoring web browsing behavior with differential privacy
Proceedings of the 23rd international conference on World wide web
Differentially private histogram publication
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-hoc techniques have been proposed in the literature, though none are known to be provably private. In this paper, we take a major step towards a solution: we show how queries, clicks and their associated perturbed counts can be published in a manner that rigorously preserves privacy. Our algorithm is decidedly simple to state, but non-trivial to analyze. On the opposite side of privacy is the question of whether the data we can safely publish is of any use. Our findings offer a glimmer of hope: we demonstrate that a non-negligible fraction of queries and clicks can indeed be safely published via a collection of experiments on a real search log. In addition, we select an application, keyword generation, and show that the keyword suggestions generated from the perturbed data resemble those generated from the original data.