Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Convex Optimization
PRAW—A PRivAcy model for the Web: Research Articles
Journal of the American Society for Information Science and Technology
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Protection of Location Privacy using Dummies for Location-based Services
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
Specification of a framework for the anonymous use of privileges
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
A TTP-free protocol for location privacy in location-based services
Computer Communications
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
From t-Closeness to PRAM and Noise Addition Via Information Theory
PSD '08 Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases
The SPARTA pseudonym and authorization system
Science of Computer Programming
Private location-based information retrieval through user collaboration
Computer Communications
Privacy preservation improvement by learning optimal profile generation rate
UM'03 Proceedings of the 9th international conference on User modeling
A survey of single-database private information retrieval: techniques and applications
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
From t-Closeness-Like Privacy to Postrandomization via Information Theory
IEEE Transactions on Knowledge and Data Engineering
Microaggregation for database and location privacy
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
A theoretical model for obfuscating web navigation trails
Proceedings of the Joint EDBT/ICDT 2013 Workshops
A collaborative protocol for anonymous reporting in vehicular ad hoc networks
Computer Standards & Interfaces
DocCloud: A document recommender system on cloud computing with plausible deniability
Information Sciences: an International Journal
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Towards practical private processing of database queries over public data
Distributed and Parallel Databases
Hi-index | 754.84 |
We present a mathematical formulation for the optimization of query forgery for private information retrieval, in the sense that the privacy risk is minimized for a given traffic and processing overhead. The privacy risk is measured as an Information-theoretic divergence between the user's query distribution and the population's, which includes the entropy of the user's distribution as a special case. We carefully Justify and interpret our privacy criterion from diverse perspectives. Our formulation poses a mathematically tractable problem that bears substantial resemblance with rate-distortion theory.